First OpenPGP.conf 2016 in Cologne, Germany

Recently, I’ve attended the first ever OpenPGP conference in Cologne, Germany. It’s amazing how 25 years of OpenPGP have passed without any conference for bringing various OpenPGP people together. I attended rather spontaneously, but I’m happy to have gone. It’s been very insightful and I’m really glad to have met many interesting people.

Werner himself opened the conference with his talk on key discovery. He said that the problem of integrating GnuPG in MUAs is solved. I doubt that with a fair bit of confidence. Besides few weird MUAs (mutt, gnus, alot, …) I only know KMail (should maybe also go into the “weird” category ;-) ) which uses GnuPG through gpgme, which is how a MUA really should consume GnuPG functionality. GNOME’s Evolution, while technically correct, supports gnugp, but only badly. It should really be ported to gpgme. Anyway, Werner said that the problem of encryption has been solved, but now you need to obtain the key for the party you want to communicate with. How can you find the key of your target? He said that keyservers cannot map a mail address to a key. It was left a bit unclear what he meant, but he probably referred to the problem of someone uploading a key for your email address without your consent. Later, he mentioned the Web of Trust, which is meant for authenticating the other user’s key. But he disliked the fact that it’s “hard to explain”. He didn’t mention why, though. He did mention that the WoT exposes the global social graph, which is not a desirable feature. He also doubts that the Web of Trust scales, but he left the audience wondering why. To solve the mapping problem, you might imagine keyservers which verify your email address before accepting your key. These, he said, “harm the system”. The problem, he said, is that this system only works with one keyserver which would harm the decentralised nature of the OpenPGP system and bring us back in to the x.500 dark age. While I agree with the conclusion, I don’t fully agree with the premise. I don’t think it’s clear that you cannot operate a verifying server network akin to how it’s currently done. For example, the pool of keyservers could only accept keys which were signed by one of the servers of the pool within the last, say, 6 months. Otherwise, the user has to enrol by following a challenge-response protocol. The devil may be in the details, but I don’t see how it’s strictly impossible.

However, in general, Werner likes the OpenSSH approach better. That is, it opportunistically uses a key and detects when it changes. As with the Web of Trust, the key validation happens on your device, only. Rather than, say, have an external entity selling the trust as with X.509.

Back to the topic. How do you find a key of your partner now? DANE would be an option. It uses DNSSEC which, he said, is impossible to implement a client for. It also needs collaboration of the mail provider. He said that Posteo and mailbox.org have this feature.

Anyway, the user’s mail provider needs to provide the key, he said. Web Key Directory is a new proposal. It uses https for key look-up on a well known name on the domain of the email provider. Think .well-known/openpgp/. It’s not as distributed as DNS but as decentralised as eMail is, he said. It still requires collaboration of the email provider to set the Web service up. The proposal trusts the provider to return genuine keys instead of customised ones. But the system shall only be used for initial key discovery. Later, he mentioned to handle revocation via the protocol™. For some reason, he went on to explain a protocol to submit a key in much more detail rather than expanding on the protocol for the actual key discovery, what happens when the key gets invalid, when it expired, when it gets rolled over, etc.
—-

Next up was Meskio who talked about Key management at LEAP, the LEAP Encryption Access Project. They try to provide a one-stop solution to encrypting all the things™. One of its features is to transparently encrypt emails. To achieve that, it opens a local MTA and an IMAPd to then communicate via a VPN with the provider. It thus builds on the idea of federation the same way current email protocols do, he said. For LEAP to provide the emails, they synchronise the mailbox across devices. Think of a big dropbox share. But encrypted to all devices. They call it soledad which is based on u1db.

They want to protect the user from the provider and the provider from the user. Their focus on ease of use manifests itself in puppet modules that make it easy to deploy the software. The client side is “bitmask“, a desktop application written in Qt which sets everything up. That also includes transparently getting keys of other users. Currently, he said, we don’t have good ways of finding keys. Everything assumes that there is user intervention. They want to change that and build something that encrypts emails even when the user does not do anything. That’s actually quite an adorable goal. Security by default.

Regarding the key validation they intend to do, he mentioned that it’s much like TOFU, but with many many exceptions, because there are many corner cases to handle in that scheme. Keys have different validation levels. The key with the highest validation level is used. When a key roll-over happens, the new key must be signed by the old one and the new key needs to be at least of a validation level as the old one. Several other conditions need to also hold. Quite an interesting approach and I wish that they will get more exposure and users. It’s promising, because they don’t change “too” much. They still do SMTP, IMAP, and OpenPGP. Connecting to those services is different though which may upset people.


More key management was referred on by Comodo’s Phillip Hallam-Baker who went then on to talk about The Mathematical Mesh: Management of Keys. He also doesn’t want to change the user experience except for simplifying everything. Every button to push is one too many, he said. And we must not write instructions. He noted that if every user had a key pair, we wouldn’t need passwords and every communication would be secured end-to-end. That is a strong requirement, of course. He wants to have a single trust model supporting every application, so that the user does not have to configure separate trust configurations for S/MIME, OpenPGP, SSH, etc. That again is a bit of a far fetched dream, I think. Certainly worth working towards it, but I don’t believe to experience such a thing in my lifetime. Except when we think of single closed system, of course. Currently, he said, fingerprints are used in two ways: Either users enter them manually or they compare it to a string given by a secure source.

He presented “The Mesh” which is a virtual store for configuration information. The idea is that you can use the Mesh to provision your devices with the data and keys it needs to make encrypted communication happen. The Mesh is thus a bit of a synchronised storage which keeps encrypted data only. It would have been interesting to see him relate the Mesh to Soledad which was presented earlier. Like Soledad, you need to sign up with a provider and connect your devices to it when using the Mesh. His scheme has a master signature key which only signs a to be created administration key. That in turn signs application- and device keys. Each application can create as many keys as it needs. Each device has three device keys which he did unfortunately not go into detail why these keys are needed. He also has an escrow method for getting the keys back when a disaster happens: The private keys are encrypted, secret shared, and uploaded. Then, you can use two out of three shares to get your key back. I wonder where to upload those shares to though and how to actually find your shares back.

Then he started losing me when he mentioned that OpenPGP keyservers, if designed today, would use a “linked notary log (blockchain)”. He also brought (Proxy-) reencryption into the mix which I didn’t really understand. The purpose itself I think I understand: He wants the mesh to cater for services to re-encrypt to the several keys that all of one entity’s devices have. But I didn’t really understand why it’s related to his Mesh at all. All together, the proposal is a bit opportunistic. But it’s great to have some visions…

Bernhard Reiter talked about getting more OpenPGP users by 2017. Although it was more about whitewashing the money he receives from German administration… He is doing gpg4win, the Windows port of GnuPG. The question is, he said, how to get GnuPG to a large user base and to make them use it. Not surprisingly, he mentioned that we need to improve the user experience. Once he user gets in touch with cryptography and is exposed to making trust decisions, he said, the user is lost. I would argue otherwise, because the people are heavily exposed to cryptography when using whatsapp. Anyway, he then referred to an idea of his: “restricted documents”. He wants to build a military style of access control for documents. You can’t blame him; it’s probably what he makes money off.

He promised to present ideas for Android and the Web. Android applications, he said, run on devices that are ten times smaller and slower compared to “regular” machines. They did actually conduct a study to find this, and other things, out. Among the other things are key insights such as “the Android permission model allows for deploying end to end encryption”. Genius. They also found out that there is an OpenPGP implementation in Bouncy Castle which people use and that it’s possible to wrap libgcrypt for Java. No shit!!1 They have also identified OpenKeychain and K9 mail as applications using OpenPGP. Wow. As for the Web, their study found out that Webmail is a problem, but that an extension to a Web browser could make end to end encryption possible. Unbelievable. I am not necessarily disappointed given that they are a software company and not a research institute. But I’m puzzled in what reality these results are interesting to the audience of OpenPGP.conf. In any case, his company conducted the study as part of the public tender they won and their results may have been biased by his subcontractors who are deeply involved in the respective projects (i.e. Mailvelope, OpenKeychain, …).

As for his idea regarding UX, his main idea is to implement Web Key Directory (see Werner’s opening talk) discovery mechanism. While I think the approach is good, I still don’t think it is sufficient to make 2017 the year of OpenPGP. My concerns revolve about the UX in non straight-forward cases like people revoking their keys. It’s also one thing to have a nice UX and another to actually have users going for it. Totally unrelated but potentially interesting: He said that the German Federal Office for Information Security (“BSI”) uses 500 workstations with GNU/Linux with a Plasma desktop in addition to Windows.

—-

Holger Krekel then went on to refer about automatic end to end encrypted emails. He is working on an EU funded project called NEXTLEAP. He said that email is refusing to die in favour of Facebook and all the other new kids on the block. He stressed that email is the largest open social messaging system and that many others use it as an anchor of identity. However, many people use it for “SPAM and work” only, he said. He identified various usability problems with end to end encrypted email: key distribution, preventing SPAM, managing secrets across devices, and handle device or key loss.

To tackle the key distribution problem, he mentioned CONIKS, Werner’s Webkey, Mailvelope, and DANE as projects to look into. With these, the respective providers add APIs to find public keys for a person. We know about Werner’s Webkey proposal. CONIKS, in short, is a key transparency approach which requires identity providers to publicly testify your key. Mailvelope automatically asks a verifying key server to provide the recipient’s key. DANE uses DNS with DNSSEC to distribute keys.

He proposed to have inline keys. That means to attach keys and cryptographic information to your emails. When you receive such a message, you would parse the details and use them for encryption the next time you create a message. The features of such a scheme, he said, are that it is more private in the sense that there is no public key server which exposes your identity. Also, it’s simpler in the sense that you “only” need to get support from MUAs and you don’t need to care about extra infrastructure. He identified that we need to run a protocol over email if we ever want to support that scheme. I’m curious to see that, because I believe that it’s good if we support protocols via email. Much like Outlook already does with its voting. SPAM prevention would follow naturally, he said. Because the initial message is sent as plain text, you can detect SPAM. Only if you reply, the other party gets your key, he said. I think it should be possible to get a person’s key out of band, but that doesn’t matter much, I guess. Anyway, I couldn’t really follow that SPAM argument, because it seems to imply that we can handle SPAM in the plain text case. But if that was the case, then we wouldn’t have the SPAM problem today. For managing keys, he thinks of sharing your keys via IMAP, like in the whiteout proposal.

—-

Stefan Marsiske then talked about his concerns regarding the future directions of GnuPG. He said he did some teaching regarding crypto and privacy preserving tools and that he couldn’t really recommend GnuPG to anyone, because it could not be used by the people he was teaching. Matt Green and Schneier both said that PGP is not able to secure email or that email is “unsecurable”. This is inline with the list that secushare produced. The saltpack people also list some issues they see with OpenPGP. He basically evaluated gpg against the list of criteria established in the SoK paper on instant messaging which is well worth a read.

Lutz Donnerhacke then gave a brief overview of the history of OpenPGP. He is one of the authors of the initial OpenPGP standard. In 1992, he said, he read about PGP on the UseNet. He then cared about getting PGP 2.6.3(i)n out of the door to support larger keys than 1024 and fix other bugs that annoyed him. Viacrypt then sold PGP4 which was based on PGP2. PGP5 was eventually exported in books and were scanned back in during HIP97 and CCCamp99, he said. Funnily enough, a bug lurked for about five years, he said. Their get_random always returned 1…

Funnily enough he uses a 20 years old V3 key so at least his Key ID is trivially forgeable, but the fingerprint should also be easy to create. He acknowledges it but doesn’t really care. Mainly, because he “is a person from the last century”. I think that this mindset is present in many people’s heads…

The next day Intevation’s Andre Heinecke talked about the “automated use of gpg through gpgme“. GPGME is the abbreviation of “GnuPG made easy” and is meant to be a higher level abstraction for gpg. “gpg is a tool not a library”, he said. For a library you can apply versioning while the tool may change its output liberally, he said. He mentions gpg’s machine interface with --with-colons and that changes to that format will break things. GpgME will abstract that for you and tries to make the tool a library. There is a defined interface and “people should use it”. A selling point is that it works with all gpg versions.

When I played around with gpgme, I found it convoluted and lacking basic operations. I think it’s convoluted because it is highly stateful and you need to be careful with calling (many) functions in the correct order if you don’t want it to complain. It’s lacking, because signing other people’s keys is a weird thing to do and the interface is not designed with that in mind. He also acknowledged that it is a fairly low level API in the sense that every option has to be set distinctly and that editing keys is especially hard. In gpgme, he said, operations are done based on contexts that you have to create. The context can be created for various gpg protocols. Surprisingly, that’s not only OpenPGP, but also CMS, GpgConf, and others.

I don’t think GNOME Software is ported to gpgme. At least Evolution and Seahorse call gpg directly rather than using gpgme. We should change that! Although gpgme is a bit of a weird thing. Normally™ you’d have a library build a tool with it. With gpgme, you have a tool (gpg) and build a library. It feels wrong. I claim that if we had an OpenPGP library that reads and composes packets we would be better off.

Vincent and Dominik came to talk about UX decisions in OpenKeychain, the Android OpenPGP implementation. It does key management, encryption and decryption of files, and other OpenPGP operations such as signing keys. The speakers said that they use bouncy castle for the crypto and OpenPGP serialisation. They are also working on K9 which will support PGP/MIME soon. They have an Open Tech Fund which finances that work. In general, they focused on the UX to make it easy for the consumer. They identified “workflows” users possibly want to carry out with their app. Among them are the discovery and exchange of keys, as well as confirming them (signing). They gave nice looking screenshots of how they think they made the UI better. They probably did, but I found it the foundations a bit lacking. Their design process seems to be a rather ad-hoc affair and they themselves are their primary test subjects. While it’s good work, I don’t think it’s easily applicable to other projects.

An interesting thing happened (again): They deviate from the defaults that GnuPG uses. Unfortunately, the discussions revolving about that fact were not very elaborate. I find it hard to imagine that both tools have, say, different default key lengths. Both tools try to prevent mass surveillance so you would think that they try to use the same defaults to achieve their goal. It would have been interesting to find out what default value serves the desired purpose better.

Next up was Kritian Fiskerstrand who gave an update on the SKS keyserver network. SKS is the software that we trust our public keys with. SKS is written in OCaml, which he likes, but of which he said that people have different opinions on. SKS is single threaded which is s a problem, he said. So you need to have a reverse proxy to handle more than one client.

He was also talking about the Evil32 keys which caused some stir-up recently. In essence, the existing OpenPGP keys were duplicated but with matching short keyids. That means that if you lookup a key by its short key ID, you’re screwed, because you get the wrong key. If you are using the name or email address instead, then you also have a problem. People were upset about getting the wrong key when having asked the keyserver to deliver.

He said that it’s absolutely no problem because users should verify the keys anyway. I can only mildly agree. It’s true that users should do that. But I think we would live in a nicer world where we could still maintain a significantly high security level of such a rigorous verification does not happen. If he really maintains that point of view then I’m wondering why he is allowing keys to be retrieved by name, email address, or anything else than the fingerprint in first place.

—-

Volker Birk from pretty Easy privacy talked about their project which aims at making encrypted email possible for the masses.
they make extensive use of gpgme and GnuNet, he said. Their focus is “privacy by default”. Not security, he said. If security and privacy are contradicting in some cases, they go for privacy instead of security. For example, the Web of Trust is a good idea for security, but not for privacy, because it reveals the social graph. I really like that clear communication and the admission of security and privacy not necessarily going well together. I also think that keyservers should be considered harmful, mainly because they are learning who is attempting to communicate with whom. He said that everything should be decentralised and peer-to-peer. Likewise, a provider should not be responsible for binding an email address to a key. The time was limited, unfortunately, so the actual details of how it’s supposed to be working were not discussed. They wouldn’t be the first ones to attempt a secure or rather privacy preserving solution. In the limited time, however, he showed how to use their Python adapter to have it automatically locate a public key of a recipient and encrypt to it. They have bindings for various other languages, too.

Interestingly, a keysigning “party” was scheduled on the first evening but that didn’t take place. You would expect that if anybody cared about that it is the OpenPGP hardcore hackers, all of which were present. But not a single person (as in nobody, zero “0”, null) was interested. You can’t blame them. It’s probably been a cool thing when you were younger and GnuPG this was about preventing the most powerful targetted attacks. I think people realised that you can’t have people mumble base16 encoded binary strings AND mass adoption. You need to bring at least cake to the party… Anyway, as you might be aware, we’re working towards a more pleasant key signing experience :) So stay tuned for updates.

Talking on Searchable Encryption at 32C3 in Hamburg, Germany

This year again, I attended the Chaos Communication Congress. It’s a fabulous event. It has become much more popular than a couple of years ago. In fact, it’s so popular, that the tickets (probably ~12000, certainly over 9000) have been sold out a week or so after the sales opened. It’s gotten huge.

This year has been different than the years before. Not only were you able to use your educational leave for visiting the CCCongress, but I was also giving a talk. Together with my colleague Christian Forler, we presented on Searchable Encryption. We had the first slot on the last day. I think that’s pretty much the worst slot in the schedule you could get ;-) Not only because the people are in Zombie mode, but also because you have received all those viruses and bacteria yourself. I was lucky enough, but my colleague was indeed sick on day 4. It’s a common thing to be sick after the CCCongress :-/ Anyway, we have hopefully entertained the crowd with what I consider easy slides, compared to the usual™ Crypto talk. We used a lot imagery and tried to allude to funny stuff. I hope people enjoyed it. If you have seen it, don’t forget to leave feedback! It was hard to decide on the appropriate technical level for the almost 1800 people. The feedback we’ve received so far is mixed, so I guess we’ve hit a good spot. The CCCongress was amazingly organised for speakers. They really did care for us and made sure everything was right. So everything was perfect expect for pdfpc which crashed whenever it was meant to display a certain slide… I used Evince then and it worked…

The days at the CCCongress were intense as you might be able to tell from the Fahrplan. It generally started at about 12:00 and ended at about 01:00. And that’s only the talks. You can’t avoid bumping into VIP (very interesting people) and thus spend time in the hallway. And then you have these amazing parties. This year, they had motor-homes and lasers in the dance hall (last year it was a water cannon…). Very crazy atmosphere. It’s highly recommended to spend a night there.

Anyway, day 1 started for me with the Keynote by Fatuma Musa Afrah. The speaker stretched her time a little, I felt. At the beginning I couldn’t really grasp what her topic was or what she wanted to tell us. She repeatedly told us that we had to “kill the time together” which killed my sympathy to some extent. The conference’s motto was Gated Communities. She encouraged us to find ways to open these gates by educating people and helping them. She said that we have to respect each other irrespective of the skin colour or social status. It was only later that she revealed being refugee who came to Germany. Although she told us that it’s “Newcomers”, not “refugees”. In fact, she grew up in Kenya where she herself was a newcomer. She fled to Kenya, so she fled twice. She told us stories about her arriving and living in Germany. I presume she is breaking open the gates which separate the communities she’s living in, but that’s speculation. In a sense she was connecting her refugee community with our hacker community. So the keynote was interesting for that perspective.

Joanna Rutkowska then talked about trustworthy laptops. The basic idea is to have no state on the laptop itself, i.e. no place where malware could be injected. The state should instead be kept on a personal storage medium, like an SD card or a pen drive. She said that laptops are inherently not trustworthy. Trust, she said can be broken up into Trusted, Secure, and Trustworthy. Secure is resistant to attacks. Trusted is something we, as Security community, do not want to have, like a Trusted third party. Trustworthy, she said, is something different, like the Intel Management Engine which might be resistant to attacks, yet it is not acting in the interest of the user. Application level security is meaningless, she said, when we cannot trust the Operating System, because it is the trusted part. If it is compromised then every effort is not useful. Her project, Qubes OS, attempts to reduce the Trusted Computing Base. What is Operating system to the application, is the hardware to the Operating system. The hardware, she said, has been assumed to be trusted. A single malicious peripheral, like a malicious wifi module, can compromise the whole personal computer, the whole digital life, she said. She was referring to problems with Intel x86 platforms. Present Intel processors integrate everything on the main chip. The motherboard has been made more or less only a holder for the CPU and the memory. The construction of those big chips is completely opaque. We have no control over what is inside. And we cannot look inside, even if we wanted to. The firmware is being loaded during boot from a discrete element on the mainboard. We cannot, however, verify what firmware really is on the chip. One question is how to enforce read-only-ness of the system or how to upload your own firmware. For many years, she and others believed that TPM, TXT, or UEFI secure boot could solve that problem. But all of them have shown to fail horribly, she said. Unfortunately, she didn’t mention how so. So as of today, there is no such thing as a secure boot. Inside the processor is a management engine which special, because it is the perfect entry for backdooring and zombification of personal computing. By zombification, she means that the involvement of the Apps (vs. OS vs. Hardware) is decreasing heavily and make the hardware have much more of a say. She said that Intel wants to make the Hardware fully control your computing by having much more logic in the management engine. The ME is, in a sense, a gated community, because you cannot, whatsoever, inspect it, tinker with it, or otherwise get in touch. She said that the war is lost on X86. Even if we didn’t have the management engine. Again, she didn’t say why. Her proposal is to move all those moving firmware parts out to a trusted storage. It was an interesting perspective on what I think is a “simple” Free Software problem. Because we allow proprietary software, we now have the problem to see what is loaded into the hardware. With Free Software we’d still have backdoors in hardware, but assuming that most functionality is encoded in firmware, we could see and modify the existing firmware and build, run, and share our “better” firmware.

Ilja van Sprundel talked about Windows driver security or rather their attack surface. I’m not necessarily interested in Windows per se, but getting some lower level knowledge sounded intriguing. He gave a more high level overview of what to do and what to not do when doing driver development for Windows. The details, he said, matter. For example whether the IOManager probes a buffer in *that* instance. The Windows kernel is made of several managers, he said. The Windows Driver Model (WDM) is the standard model for how drivers are written. The IO Manager proxies requests from user to (WDM drivers. It may or may not validate arguments. Another central piece in the architecture are IO Request Packets (IRPs). They are being delivered from the IO Manager to the driver and contain all the necessary information for the operation in question. He went through the architecture really fast and it was hard for a kernel newbie like me to follow all the concepts he mentioned. Interestingly though, the IO Manager seems to also care about transferring the correct amount of memory from userspace to kernel space (e.g. makes sure data does not overflow) if you want it to using METHOD_BUFFERED. But, as he said, most of the drivers use METHOD_NEITHER which does not check anything at all and is the endless source of driver bugs. It seems as if KMDF is an alternative framework which makes it harder to have bugs. However, you seem to need to understand the old framework in order to use that new one properly. He then went on to talk about the actual attack surface of drivers. The bugs are either privilege escalation, denial of service, or information leak. He said that you could avoid the problem of integer overflow by using the intsafe library. But you have to use them properly! Most importantly, you need to check their return type and use the actual values you want to have been made safe. During creation of a device, a driver can call either IoCreateDeviceSecure with an SDDL string or use an INF file to ACL the device. That is, however, done either rarely or wrongly, he said. You need to think about who needs to have access to your device. When you work with the IOManager, you need to check whether Irp->MdlAddress is NULL which can happen, he said, if it’s a zero sized buffer. Similarly, when using the safer METHOD_BUFFERED mentioned earlier, Irp->AssociatedIrp.SystemBuffer can also be NULL. So avoid having that false sense of security when using that safe API. Another area of bugs is the cancellation of IRPs. The userland can cancel requests which apparently is not handled gracefully by drivers and leads to deadlocks, memory leaks, race conditions, double frees, and other classes of bugs. When dealing with data from userland, you are supposed to “probe” the memory which is basically checking whether the pointers are valid and in the expected range. If you don’t do that, it’ll lead to you writing to arbitrary kernel memory. If you do validate the data from userspace, make sure you don’t fetch it again from user space assuming that it hasn’t changed. There might be race between your check and your usage (TOCTOU). So better capture, validate, and use the data. The same applies when using MDLs. That, however, is more tricky, because you have a double mapping and you are using a kernel pointer. So it is very subtle. When you do memory allocation you can either use ExAllocatePool or ExAllocatePoolWithQuota. The latter throws an exception instead of returning NULL. Your exception or NULL pointer handling needs to be double checked, he said. It was a very technical talk on Windows which was way out of my comfort zone. I only understood a tiny fraction of what he was presenting. But I liked it for the new insight on Windows drivers and that the same old classes of bug have not died yet.

High up on my list of awaited talks was the talk on train systems by the SCADA strangelove people. Railways, he said, is the biggest system built by mankind. It’s main components are signals and switches. Old switches are operated manually by pure force. Modern switches are interlocked with signals such that the signals display forbidden entry when switches are set in certain positions. On tracks, he said, signals are transmitted over the actual track by supplying them with AC or DC. The locomotive picks up the signals and supplies various systems with them. The Eurostar, they said, has about seven security systems on board, among them a “RPS”, a Reactor Protection System which alludes to nuclear trains… They said that lately the “Bahn Automatisierungssystem (SIBAS)” has been updated to use much more modern and less proprietary soft- and hardware such as VxWorks and x86 with ELF binaries as well as XML over HTTP or SS7. In the threat model they identified, they see several attack vectors. Among them are making someone plug a malicious USB device in controlling machines in some operation center. He showed pictures from supposedly real operation centers. The physical security, he said, is terrible. With close to no access control. In one photograph, he showed a screenshot from a documentary aired on TV which showed credentials sticking on the screen… Even if the security is quite good, like good physical security and formally proven programs, it’s still humans who write the software, he said, so there will be bugs to be exploited. For example, he showed screenshots of when he typed “railway” into Shodan and the result included a good number of railway stations. Another vector is GSM-R. If you jam the train’s GSM-R connection, the train will simply stop. Also, you might be able to inject SIM toolkit malware. Via that vector, you might make the modem identify as, e.g. a keyboard and then penetrate further into the systems. Overall an entertaining talk, but the claims were a bit over the top. So no real train hacking just yet.

The talk on memory corruption by Mathias Payer started off by saying that software is unsafe and insecure. Low level languages trade type safety and memory safety for performance. A large set of legacy applications, he said, are prone to memory vulnerabilities. There are, he continued too many bugs to find and fix manually. So we need a runtime system to ensure security. An invalid dereference or an out of bounds pointer is the core of memory unsafety problems. But according to the C language, he claimed, it’s only a violation if the invalid pointer is read, written to, or freed. So during runtime, there are tons and tons of dangling pointers which is perfectly fine. With such a vulnerability a control-flow attack could be executed. Several defenses exist: Data Execution Prevention prevents code from actually being executed. Address Space Layout Randomisation scrambles the memory locations of executable code which makes it harder to successfully exploit a vulnerable. Stack canaries are special values which are supposed to detect overflowing writes. Safe exception handlers ensure that exception code paths follow predefined patterns. The DEP can only work together with ASLR, he said. If you broke ASLR, you could re-use existing code; as it turns out, people do break ASLR every now and then. Two new mechanisms are Stack Integrity and Code Flow Integrity. Stack Integrity enforces to return to the actual caller by having a shadow stack. He didn’t mention how that actually works, though. I suppose you obtain a more secret stack address somewhere and switch the stack pointer before returning to check whether the return address is still correct. Control Flow Integrity builds a control flow graph during compilation and for every control flow change it checks at run time whether the target address is allowed. Apparently, many CFI implementations exist (eleven were shown). He said they’ve measured those and IFCC and Lockdown performed rather badly. To show how all of the protection mechanisms fail, he presented printf-oriented programming. He said that printf was Turing complete and presented a domain specific language. They have built a brainfuck interpreter with snprintf calls. Another rather technical talk by a good speaker. I remember that I was already impressed last year when he presented on these new defense mechanisms.

DJB and Tanja Lange started their “late night show” by bashing TLS as a “gigantic clusterfuck”. They were presenting on quantum computing and cryptography. They started by mentioning that the D-Wave quantum computer exists, but it’s not useful, he said. It doesn’t do the basic things, and can only do limited computations. It can especially not perform Shor’s algorithm. So there’s no “Shor monster coming”. They recommended the Timeline of Quantum Computing as a good reference of the massive research effort going into quantum computing. If there was a general quantum computer pretty much every public key scheme deployed on the Internet today will be broken. But also symmetric schemes are under attack due to Grover’s algorithm which speeds up brute force algorithms significantly. The solution could be physical crypto like using strong (physical) locks. But, he said, the assumptions of those systems are already broken. While Quantum Key Distribution is secure under certain assumptions, those assumptions are off, he said. Secure schemes that survive the quantum era were the topic of their talk. The first workshop on that workshop happened in 2006 and efforts are still being made, e.g. with EU projects on the topic. The time it takes for a crypto scheme to gain significant traction has been long, so far. They gave ECC as an example. It has been introduced in the 1980s, but it’s only now that it’s taking over the deployed crypto on the Internet. So the time it takes is long. They gave recommendations on what to do to have connections that are secure “for at least the next hundred years”. These include at least 256 bit keys for symmetric encryption. McEliece with binary Goppa codes n=6960 k=5413 t=119. An efficient implementation of such a code based scheme is McBits, she said. Hash based signatures with, e.g. XMSS or SPHINCS-256. All you need for those is a proper hash function. The stuff they recommend for the next 100 years, like the McEliece system, are things from the distant past, she said. He said that Post Quantum Cryptography will be the standard in a couple of years from now so he urged the cryptographers in the audience to “get used to this stuff”.

Next on my list was Markus’ talk on Landesverrat which is the incident of Netzpolitik.org being investigated for revealing secret documents. He referred on the history of the case, how it came around that they were suspected of revealing secret documents. He said that one of their believes is to publish their sources, even the secret ones. They want their work to be critically reviewed and they believe that it is only possible if the readers can inspect the sources. The documents which lead to the criminal investigations were about finances of the introduction of the XKeyscore software. Then, the president of the “state security” filed a case against because of revealing secret documents. They wanted to publish the investigation files, but they couldn’t see them, because they were considered to be more secret than the documents they have already published… From now on, he said, they are prepared for the police raiding their offices, which I suppose is good standard preparation. They were lucky, he said, because their case fell into the regular summer low of news which could make the case become quite popular in the media. A few weeks earlier or later and they were much less popular due to the refugees or Greece. During the press coverage, they had a second battleground where they threw out a Russian television team who entered their offices without having called or otherwise introduced themselves… For the future, he wants to see changes in what is considered to be a state secret. He doesn’t want the government to decide what such a secret is. He also wants to have much more protection for whistle blowers. Freedom of press should also hold for people who do not blog for their “occupation”, but also hobbyists.

Vincent Haupert was then talking on App-based TAN online banking methods. It’s a classic two factor method: Not only username and password, but also a TAN. These TAN methods have since evolved in various ways. He went on to explain the general online banking process: You log in with your credentials, you create a new wire transfer and are then asked to provide a TAN. While ChipTAN would solve many problems, he said, the banking industry seems to want their customers to be able to transfer money everywhere™. So you get to have two “Apps” on your mobile computer. The banking app and a TAN app. However, malware in “official” app stores are a reality, he said. The Google Playstore cannot protect against malware, as a colleague of him demonstrated during his bachelor thesis. This could also been by the “Brain Test” app which roots your device and then loads malware. Anyway, they hijacked the connection from the banking app to modify the recipient of the issued wire transfer and the TAN being pushed on the device. They looked at the apps and found that they “protected” their app with “Promon Shield“. That seems to be a strong obfuscation framework. Their attack involved tricking the root and hooks detection. For the root detection they check on the file system for certain binaries. He could simply change the filenames and was good to go. For the hooks (Xposed) it was pretty much the same with the exception of a few filenames which needed more work. With these modifications they could also “hack” the newer version 1.0.7. Essentially the biggest part of the problem is that the two factors are on one device. If the attacker hijacks that one device then ,

The talk by Christian Schaffner on Quantum Cryptography was introducing the audience to quantum mechanics. He said that a qubit can be imagined as the direction of a polarised photon. If you make the direction of the photons either horizontal or vertical, you can imagine that as representing 0 or 1. He was showing an actual physical experiment with a laser pointer and polarisation filters showing how the red dot of the laser pointer is either filtered or very visible. He also showed how actually measuring the polarisation changes the state of the photons! So yet another filter made the point in the back brighter. That was a bit weird, but that’s quantum mechanics. He showed a quantum random number generator based on that technology. One important concept is the no-cloning theorem which state that you can make a perfect copy of a quantum bit. He also compared current and “post quantum” crypto systems against efficient classical attackers and efficient quantum attackers. AES, SHA, RSA (or discrete logs) will be broken by quantum attacks. Hash-based signatures, McEliece, and lattice-based cryptography he considered to be resistant against quantum based attacks. He also mentioned that Quantum Key Distribution systems will also be against an exhaustive attacker who applies brute force. QKD is based on the no-cloning theorem so an eavesdropper cannot see the same bits as the communicating parties do. Finally, he asked how you could prove that you have been at a certain location to avoid the pizza delivery problem (i.e. to be certain about the place of delivery).

Fefe was talking on privileges. He said that software will be vulnerable. Various techniques should be applied such as simply fixing all the bugs (haha…) or make exploitation harder by applying ASLR or ROP protection. Another idea is to put the program in a straight jacket and withdraw privileges. That sounds a lot like containerisation. Firstly, you can drop your privileges from superuser down to the least privileges you need, then do privilege separation. Another technique is the admin confining the app in a jail instead of the app confining itself. Also, you can implement access control via a broker service by splitting up your process into, say, a left half which opens and reads files and a right half which processes data. When doing privilege separation, the idea is to split up the process into several separately running programs. Jailing is like firewall rules for syscalls which, he said, is impossible for complex programs. He gave Firefox as an example of it being impossible to write a rule set for. The app containing itself is like a werewolf chaining itself to the wall before midnight, he said. You restrict yourself from opening files, creating socket, or from attaching yourself as a debugger to other processes. The broker service is probably like a reference monitor. He went on showing how old-school privilege dropping works. You could do it as easily as seteuid(getuid()), but that’s not enough, because there is the saved UID, so you need to setresuid and not forget to check the return code. Because the call can fail if, for example, the target UID had already been running too many processes for its quota. He said that you should fail the build if your target platform does not provide setresuid. However, dropping privileges is more than setting your UID. It’s also about freeing resources you don’t necessarily need. Common approaches to jailing your process are to have a fake filesystem with only the necessary files, so your process cannot ever access anything that it shouldn’t. On Linux, that would probably be chroot. However, you can escape using fchdir . Also, mounting your /proc into the chroot, information about the host is exposed. So you need to do more work than calling chroot. The BSDs, he said, have Securelevel which is a kernel mode that only increases which withdraws certain privileges. They also have jails which is a chroot on steroids, he said. It leaks some information due the PIDs, though, he said.

The next talk was on Shellphish, an automatic exploitation framework. This is really fascinating stuff. It’s been used for various Capture the Flag contests which are basically about hacking other teams’ software services. In fact, the presenters were coming from the UCSB which is hosting the famous iCtF. They went from solving security challenges to developing a system which solves security challenges. From a vulnerability binary, they (automatically) develop an exploit and a patched binary which is immune to the exploit, but preserves the functionality of the program. They automatically find vulnerabilities, patches, and test both the exploits and the patches. For the automated vulnerability component, they presented Angr. It has a symbolic execution engine looking for memory accesses outside allocated regions and unconstrained instruction pointer which is a jump controlled by user input (JMP eax). They have written a paper for NDSS about “Augmenting Fuzzing Through Selective Symbolic Execution“. Angr is a Python library and they showed how to use it for identifying the overhyped Back to 28 vulnerability. Actually, there is too much state for a regular symbolic executor to find this problem. Angr does “veritesting“. He showed that his Angr script found the vulnerability by him having excluded many paths of execution that don’t really generate new state with a few lines of code. He didn’t show though what the lines of code were and how he determined how the states are not adding any new information.

The next talk was given by the people behind Intelexit was about convincing NSA agents to stop their work and serve democracy instead. They rented a van with big mottoes printed on them, like “Listen to your heart, not to private phone calls”. They also stuck the constitution on the “constitution protection office” which then got torn apart. Another action they did was to fly over the dagger complex and to release flyers about leaving the secret services. They want to have a foundation helping secret service agents to leave their job or to blow the whistle. They also want an anonymous call service where agents can call to talk about their job. I recommend browsing their photos.

Another artsy talk was on a cheap Facebook army. Actually it was on Instagram followers. The presenter is an artist himself and he’d buy Instagram followers for fellow artists “to make them all equal”. He dislikes the fact that society seems to measure the value or quality of art in followers or likes on social media.

Around the CCCongress were also other artsy installations like this one called “machine learning”:

It’s been a fabulous event. I really admire the people organising this event each and every year. Thank you so much and see you next year, hopefully.

mrmcd 2015

I attended this year’s mrmcd, a cozy conference in Darmstadt, Germany. As in the previous years, it’s a 350 people event with a relaxed atmosphere. I really enjoy going to these mid-size events with a decent selection of talks and attentive guests.

The conference was opened by Paolo Ferri’s Keynote. He is from the ESA and gave a very entertaining talk about the Rosetta mission. He mentioned the challenges involved in launching a missile for a mission to be executed ten years later. It was very interesting to see what they have achieved over a few hundred kilometers distance. Now I want to become a space pilot, too ;-)

The next talk was on those tracking devices for your fitness. Turns out, that these tracking devices may actually track you and that they hence pose a risk for your privacy. Apparently fraud is another issue for insurance companies in the US, because some allow you to get better rates when you upload your fitness status. That makes those fitness trackers an interesting target for both people wanting to manipulate their walking statistics to get a better premium for health care and attackers who want to harm someone by changing their statistics.

Concretely, he presented, these devices run with Bluetooth 4 (Smart) which allows anyone to see the device. In addition, service discovery is also turned on which allows anyone to query the device. Usually, he said, no pin is needed anymore to connect to the device. He actually tested several devices with regard to several aspects, such as authentication, what data is stored, what is sent to the Internet and what security mechanisms the apps (for a phone) have been deployed. Among the tested devices were the XiaomMi Miband, the Fitbit, or the Huawei TalkBand B1. The MiBand was setting a good example by disabling discovery once someone has connected to the device. It also saves the MAC address of the phone and ignores others. In order to investigate the data sent between a phone and a band, they disassembled the Android applications.

Muzy was telling a fairytale about a big data lake gone bad.
He said that data lakes are a storage for not necessarily structured data which allow extraction of certain features in an on-demand fashion and that the processed data will then eventually end up in a data warehouse in a much more structured fashion. According to him, data scientists then have unlimited access to that data. That poses a problem and in order to secure the data, he proposed to introduce another layer of authorization to determine whether data scientists are allowed to access certain records. That is a bit different from what exists today: Encrypt data at rest and encrypt in motion. He claimed that current approaches do not solve actual problems, because of, e.g. key management questions. However, user rights management and user authorization are currently emerging, he said.

Later, he referred on Apache Spark. With big data, he said, you need to adapt to a new programming paradigm away from a single worker to multiple nodes, split up work, handling errors and slow tasks. Map reduce, he said, is one programming model. A popular framework for writing in a such a paradigm is Apache’s Hadoop, but there are more. He presented Apache Spark. But it only begins to make sense if you want to analyse more data than you can fit in your RAM, he said. Spark distributes data for you and executes operations on it in a parallel manner, so you don’t need to care about all of that. However, not all applications are a nice fit for Spark, he mentioned. He gave high performance weather computations as such as example. In general, Spark fits well if IPC not required.

The conference then continued with two very interesting talks on Bahn APIs. derf presented on public transport APIs like EFA, HAFAS, and IRIS. These APIs can do things like routing from A to B or answer questions such as which trains are running from a given station. However, these APIs are hardly documented. The IRIS-system is the internal Bahn-API which is probably not supposed to be publicly available, but there is a Web page which exposes (bits) of the API. Others have used that to build similar, even more fancy things. Anyway, he used these APIs to query for trains running late. The results were insightful and entertaining, but have not been released to the general public. However, the speakers presented a way to query all trains in Germany. Long story short: They use the Zugradar which also contains the geo coordinates. They acquired 160 millions datasets over the last year which is represented in 80GB of JSON. They have made their database available as ElasticSearch and Kibana interface. The code it at Github. That is really really good stuff. I’m already in the process of building an ElasticSearch and Spark cluster to munch on that data.

Yours truly also had a talk. I was speaking on GNOME Keysign. Because the CCC people know how to run a great conference, we already have recordings (torrent). You get the slides here. Those of you who know me don’t find the content surprising. To all others: GNOME Keysign is a tool for signing OpenPGP Keys. New features include the capability to sign keys offline, that is, you present a file with a key and you have it signed following best practices.

Another talk I had, this time with a colleague of mine, was on Searchable Encryption. Again, the Video already exists. The slides are probably less funny than they were during the presentation, but hopefully still informative enough to make some sense out of them. Together we mentioned various existing cryptographic schemes which allow you to have a third party execute search operations on your encrypted data on your behalf. The most interesting schemes we showed were Song, Wagner, Perrig and Cash et al..

Thanks again to the organisers for this nice event! I’m looking forward to coming back next year.

OpenPGP Key Rollover from D3492A2A to 1BF98D6D

Public Service Announcement: I am deprecating my old key 0xD3492A2A in favour of a newly generated key 0x1BF98D6D. I have uploaded a copy here. It is signed with my old key, too. FTR: It involved exporting the old secret key and the new public key to a temporary directory, change the expiry date of the old key, sign the new key and import the new signed key *sigh*. It’s only 11 years that --allow-expired-keys was discussed.

The new fingerprint is:

$ gpg --fingerprint --list-key 1BF98D6D
pub   3072D/1BF98D6D 2012-05-10 [expires: 2017-05-09]
      Key fingerprint = FF52 DA33 C025 B1E0 B910  92FC 1C34 19BF 1BF9 8D6D
uid                  Tobias Mueller tobias.mueller2  mail.dcu.ie
uid                  Tobias Mueller 4tmuelle  informatik.uni-hamburg.de
sub   3072g/3B76E8B3 2012-05-10 [expires: 2017-05-09]
$

It’s 2012 already and apparently there ain’t such a thing as best practices for rolling over your OpenPGP key. I’m thinking about something that discusses whether or how to

  1. create a new key
  2. adding old UIDs to the new key
  3. sign the new key with the old one
  4. sign the old key with the new one
  5. probably sign the new key with other secret keys in your keyring
  6. preparing a small text file stating the rollover
  7. sign that so that you can upload it to the public
  8. inform people that have signed your old key that a new one is in place

I do think the steps mentioned make sense and should be implemented to easy the key transition. I started with something very simple; you can find the code here. You are welcome to discuss what’s needed in order to properly move from one key to another.

Breaking Multiple Time Pad

A One Time Pad (OTP) is a well known concept in Cryptography. It allows you to encrypt data in a secure manner. In fact, it is proven to be secure. However, the OTP has other issues, i.e. it needs to be as long as the message to be encrypted and it needs to be stored securely. Hence you need to securely store and transmit a secret message that is as long as your plaintext. If you could do that, you could as well transmit the plaintext directly. Another issue is, that you must not use the same pad more than once, because an attacker can retrieve the plaintext by just looking at the transmitted ciphertexts.

Let’s work our way through that problem and actually see, how that works. So we will break a wrongly used One Time Pad.

The OTP works as follows. Suppose you have a message m1 and m2 and a random string k, acting as the OTP, that is at least as long the messages. The encryption of both messages is

c1 = m1 + k
c2 = m2 + k

where + denotes the XOR operation. Note that the k is the very same in both operations.

You might realize, that you can now do

d = c1 + c2 = m1 + k + m2 + k = m1 + m2

as the keys k cancel out under the XOR operation.

So you have the "difference" of the two messages and the claim is, that you can retrieve both, m1 and m2. The idea is, that you know properties of the plaintexts, i.e. them being ASCII encoded English texts, and exploit redundancy in those plaintexts.

And in fact, even two XORed ASCII encoded English texts have enough redundancy that allow you to recover them. Have a look at the following XOR-table. You will see two characters and the hexadecimal result of the XOR operation together with the ASCII value of the result.

0 0
00
0 1
01
0 2
02
0 3
03
0 4
04
0 5
05
0 6
06
0 7
07
0 8
08
0 9
09
0 a
51
Q
0 b
52
R
0 c
53
S
0 d
54
T
0 e
55
U
0 f
56
V
0 g
57
W
0 h
58
X
0 i
59
Y
0 j
5a
Z
0 k
5b
[
0 l
5c
\
0 m
5d
]
0 n
5e
^
0 o
5f
_
0 p
40
@
0 q
41
A
0 r
42
B
0 s
43
C
0 t
44
D
0 u
45
E
0 v
46
F
0 w
47
G
0 x
48
H
0 y
49
I
0 z
4a
J
0 A
71
q
0 B
72
r
0 C
73
s
0 D
74
t
0 E
75
u
0 F
76
v
0 G
77
w
0 H
78
x
0 I
79
y
0 J
7a
z
0 K
7b
{
0 L
7c
|
0 M
7d
}
0 N
7e
~
0 O
7f
0 P
60
`
0 Q
61
a
0 R
62
b
0 S
63
c
0 T
64
d
0 U
65
e
0 V
66
f
0 W
67
g
0 X
68
h
0 Y
69
i
0 Z
6a
j
0 !
11
0 "
12
0 #
13
0 $
14
0 %
15
0 &
16
0 '
17
0 (
18
0 )
19
0 *
1a
0 +
1b
0 ,
1c
0 -
1d
0 .
1e
0 /
1f
0 :
0a
0 ;
0b

0 <
0c
&#12;
0 =
0d
0 >
0e
0 ?
0f
0 @
70
p
0 [
6b
k
0 \
6c
l
0 ]
6d
m
0 ^
6e
n
0 _
6f
o
0 `
50
P
0 {
4b
K
0 |
4c
L
0 }
4d
M
0 ~
4e
N

10

39
9

3a
:

3d
=
0 &#11;
3b
;
0 &#12;
3c
<
1 0
01
1 1
00
1 2
03
1 3
02
1 4
05
1 5
04
1 6
07
1 7
06
1 8
09
1 9
08
1 a
50
P
1 b
53
S
1 c
52
R
1 d
55
U
1 e
54
T
1 f
57
W
1 g
56
V
1 h
59
Y
1 i
58
X
1 j
5b
[
1 k
5a
Z
1 l
5d
]
1 m
5c
\
1 n
5f
_
1 o
5e
^
1 p
41
A
1 q
40
@
1 r
43
C
1 s
42
B
1 t
45
E
1 u
44
D
1 v
47
G
1 w
46
F
1 x
49
I
1 y
48
H
1 z
4b
K
1 A
70
p
1 B
73
s
1 C
72
r
1 D
75
u
1 E
74
t
1 F
77
w
1 G
76
v
1 H
79
y
1 I
78
x
1 J
7b
{
1 K
7a
z
1 L
7d
}
1 M
7c
|
1 N
7f
1 O
7e
~
1 P
61
a
1 Q
60
`
1 R
63
c
1 S
62
b
1 T
65
e
1 U
64
d
1 V
67
g
1 W
66
f
1 X
69
i
1 Y
68
h
1 Z
6b
k
1 !
10
1 "
13
1 #
12
1 $
15
1 %
14
1 &
17
1 '
16
1 (
19
1 )
18
1 *
1b
1 +
1a
1 ,
1d
1 -
1c
1 .
1f
1 /
1e
1 :
0b
&#11;
1 ;
0a
1 <
0d
1 =
0c
&#12;
1 >
0f
1 ?
0e
1 @
71
q
1 [
6a
j
1 \
6d
m
1 ]
6c
l
1 ^
6f
o
1 _
6e
n
1 `
51
Q
1 {
4a
J
1 |
4d
M
1 }
4c
L
1 ~
4f
O

11

38
8

3b
;

3c
<
1 &#11;
3a
:
1 &#12;
3d
=
2 0
02
2 1
03
2 2
00
2 3
01
2 4
06
2 5
07
2 6
04
2 7
05
2 8
0a
2 9
0b
&#11;
2 a
53
S
2 b
50
P
2 c
51
Q
2 d
56
V
2 e
57
W
2 f
54
T
2 g
55
U
2 h
5a
Z
2 i
5b
[
2 j
58
X
2 k
59
Y
2 l
5e
^
2 m
5f
_
2 n
5c
\
2 o
5d
]
2 p
42
B
2 q
43
C
2 r
40
@
2 s
41
A
2 t
46
F
2 u
47
G
2 v
44
D
2 w
45
E
2 x
4a
J
2 y
4b
K
2 z
48
H
2 A
73
s
2 B
70
p
2 C
71
q
2 D
76
v
2 E
77
w
2 F
74
t
2 G
75
u
2 H
7a
z
2 I
7b
{
2 J
78
x
2 K
79
y
2 L
7e
~
2 M
7f
2 N
7c
|
2 O
7d
}
2 P
62
b
2 Q
63
c
2 R
60
`
2 S
61
a
2 T
66
f
2 U
67
g
2 V
64
d
2 W
65
e
2 X
6a
j
2 Y
6b
k
2 Z
68
h
2 !
13
2 "
10
2 #
11
2 $
16
2 %
17
2 &
14
2 '
15
2 (
1a
2 )
1b
2 *
18
2 +
19
2 ,
1e
2 -
1f
2 .
1c
2 /
1d
2 :
08
2 ;
09
2 <
0e
2 =
0f
2 >
0c
&#12;
2 ?
0d
2 @
72
r
2 [
69
i
2 \
6e
n
2 ]
6f
o
2 ^
6c
l
2 _
6d
m
2 `
52
R
2 {
49
I
2 |
4e
N
2 }
4f
O
2 ~
4c
L

12

3b
;

38
8

3f
?
2 &#11;
39
9
2 &#12;
3e
>
3 0
03
3 1
02
3 2
01
3 3
00
3 4
07
3 5
06
3 6
05
3 7
04
3 8
0b
&#11;
3 9
0a
3 a
52
R
3 b
51
Q
3 c
50
P
3 d
57
W
3 e
56
V
3 f
55
U
3 g
54
T
3 h
5b
[
3 i
5a
Z
3 j
59
Y
3 k
58
X
3 l
5f
_
3 m
5e
^
3 n
5d
]
3 o
5c
\
3 p
43
C
3 q
42
B
3 r
41
A
3 s
40
@
3 t
47
G
3 u
46
F
3 v
45
E
3 w
44
D
3 x
4b
K
3 y
4a
J
3 z
49
I
3 A
72
r
3 B
71
q
3 C
70
p
3 D
77
w
3 E
76
v
3 F
75
u
3 G
74
t
3 H
7b
{
3 I
7a
z
3 J
79
y
3 K
78
x
3 L
7f
3 M
7e
~
3 N
7d
}
3 O
7c
|
3 P
63
c
3 Q
62
b
3 R
61
a
3 S
60
`
3 T
67
g
3 U
66
f
3 V
65
e
3 W
64
d
3 X
6b
k
3 Y
6a
j
3 Z
69
i
3 !
12
3 "
11
3 #
10
3 $
17
3 %
16
3 &
15
3 '
14
3 (
1b
3 )
1a
3 *
19
3 +
18
3 ,
1f
3 -
1e
3 .
1d
3 /
1c
3 :
09
3 ;
08
3 <
0f
3 =
0e
3 >
0d
3 ?
0c
&#12;
3 @
73
s
3 [
68
h
3 \
6f
o
3 ]
6e
n
3 ^
6d
m
3 _
6c
l
3 `
53
S
3 {
48
H
3 |
4f
O
3 }
4e
N
3 ~
4d
M

13

3a
:

39
9

3e
>
3 &#11;
38
8
3 &#12;
3f
?
4 0
04
4 1
05
4 2
06
4 3
07
4 4
00
4 5
01
4 6
02
4 7
03
4 8
0c
&#12;
4 9
0d
4 a
55
U
4 b
56
V
4 c
57
W
4 d
50
P
4 e
51
Q
4 f
52
R
4 g
53
S
4 h
5c
\
4 i
5d
]
4 j
5e
^
4 k
5f
_
4 l
58
X
4 m
59
Y
4 n
5a
Z
4 o
5b
[
4 p
44
D
4 q
45
E
4 r
46
F
4 s
47
G
4 t
40
@
4 u
41
A
4 v
42
B
4 w
43
C
4 x
4c
L
4 y
4d
M
4 z
4e
N
4 A
75
u
4 B
76
v
4 C
77
w
4 D
70
p
4 E
71
q
4 F
72
r
4 G
73
s
4 H
7c
|
4 I
7d
}
4 J
7e
~
4 K
7f
4 L
78
x
4 M
79
y
4 N
7a
z
4 O
7b
{
4 P
64
d
4 Q
65
e
4 R
66
f
4 S
67
g
4 T
60
`
4 U
61
a
4 V
62
b
4 W
63
c
4 X
6c
l
4 Y
6d
m
4 Z
6e
n
4 !
15
4 "
16
4 #
17
4 $
10
4 %
11
4 &
12
4 '
13
4 (
1c
4 )
1d
4 *
1e
4 +
1f
4 ,
18
4 -
19
4 .
1a
4 /
1b
4 :
0e
4 ;
0f
4 <
08
4 =
09
4 >
0a
4 ?
0b
&#11;
4 @
74
t
4 [
6f
o
4 \
68
h
4 ]
69
i
4 ^
6a
j
4 _
6b
k
4 `
54
T
4 {
4f
O
4 |
48
H
4 }
49
I
4 ~
4a
J

14

3d
=

3e
>

39
9
4 &#11;
3f
?
4 &#12;
38
8
5 0
05
5 1
04
5 2
07
5 3
06
5 4
01
5 5
00
5 6
03
5 7
02
5 8
0d
5 9
0c
&#12;
5 a
54
T
5 b
57
W
5 c
56
V
5 d
51
Q
5 e
50
P
5 f
53
S
5 g
52
R
5 h
5d
]
5 i
5c
\
5 j
5f
_
5 k
5e
^
5 l
59
Y
5 m
58
X
5 n
5b
[
5 o
5a
Z
5 p
45
E
5 q
44
D
5 r
47
G
5 s
46
F
5 t
41
A
5 u
40
@
5 v
43
C
5 w
42
B
5 x
4d
M
5 y
4c
L
5 z
4f
O
5 A
74
t
5 B
77
w
5 C
76
v
5 D
71
q
5 E
70
p
5 F
73
s
5 G
72
r
5 H
7d
}
5 I
7c
|
5 J
7f
5 K
7e
~
5 L
79
y
5 M
78
x
5 N
7b
{
5 O
7a
z
5 P
65
e
5 Q
64
d
5 R
67
g
5 S
66
f
5 T
61
a
5 U
60
`
5 V
63
c
5 W
62
b
5 X
6d
m
5 Y
6c
l
5 Z
6f
o
5 !
14
5 "
17
5 #
16
5 $
11
5 %
10
5 &
13
5 '
12
5 (
1d
5 )
1c
5 *
1f
5 +
1e
5 ,
19
5 -
18
5 .
1b
5 /
1a
5 :
0f
5 ;
0e
5 <
09
5 =
08
5 >
0b
&#11;
5 ?
0a
5 @
75
u
5 [
6e
n
5 \
69
i
5 ]
68
h
5 ^
6b
k
5 _
6a
j
5 `
55
U
5 {
4e
N
5 |
49
I
5 }
48
H
5 ~
4b
K

15

3c
<

3f
?

38
8
5 &#11;
3e
>
5 &#12;
39
9
6 0
06
6 1
07
6 2
04
6 3
05
6 4
02
6 5
03
6 6
00
6 7
01
6 8
0e
6 9
0f
6 a
57
W
6 b
54
T
6 c
55
U
6 d
52
R
6 e
53
S
6 f
50
P
6 g
51
Q
6 h
5e
^
6 i
5f
_
6 j
5c
\
6 k
5d
]
6 l
5a
Z
6 m
5b
[
6 n
58
X
6 o
59
Y
6 p
46
F
6 q
47
G
6 r
44
D
6 s
45
E
6 t
42
B
6 u
43
C
6 v
40
@
6 w
41
A
6 x
4e
N
6 y
4f
O
6 z
4c
L
6 A
77
w
6 B
74
t
6 C
75
u
6 D
72
r
6 E
73
s
6 F
70
p
6 G
71
q
6 H
7e
~
6 I
7f
6 J
7c
|
6 K
7d
}
6 L
7a
z
6 M
7b
{
6 N
78
x
6 O
79
y
6 P
66
f
6 Q
67
g
6 R
64
d
6 S
65
e
6 T
62
b
6 U
63
c
6 V
60
`
6 W
61
a
6 X
6e
n
6 Y
6f
o
6 Z
6c
l
6 !
17
6 "
14
6 #
15
6 $
12
6 %
13
6 &
10
6 '
11
6 (
1e
6 )
1f
6 *
1c
6 +
1d
6 ,
1a
6 -
1b
6 .
18
6 /
19
6 :
0c
&#12;
6 ;
0d
6 <
0a
6 =
0b
&#11;
6 >
08
6 ?
09
6 @
76
v
6 [
6d
m
6 \
6a
j
6 ]
6b
k
6 ^
68
h
6 _
69
i
6 `
56
V
6 {
4d
M
6 |
4a
J
6 }
4b
K
6 ~
48
H

16

3f
?

3c
<

3b
;
6 &#11;
3d
=
6 &#12;
3a
:
7 0
07
7 1
06
7 2
05
7 3
04
7 4
03
7 5
02
7 6
01
7 7
00
7 8
0f
7 9
0e
7 a
56
V
7 b
55
U
7 c
54
T
7 d
53
S
7 e
52
R
7 f
51
Q
7 g
50
P
7 h
5f
_
7 i
5e
^
7 j
5d
]
7 k
5c
\
7 l
5b
[
7 m
5a
Z
7 n
59
Y
7 o
58
X
7 p
47
G
7 q
46
F
7 r
45
E
7 s
44
D
7 t
43
C
7 u
42
B
7 v
41
A
7 w
40
@
7 x
4f
O
7 y
4e
N
7 z
4d
M
7 A
76
v
7 B
75
u
7 C
74
t
7 D
73
s
7 E
72
r
7 F
71
q
7 G
70
p
7 H
7f
7 I
7e
~
7 J
7d
}
7 K
7c
|
7 L
7b
{
7 M
7a
z
7 N
79
y
7 O
78
x
7 P
67
g
7 Q
66
f
7 R
65
e
7 S
64
d
7 T
63
c
7 U
62
b
7 V
61
a
7 W
60
`
7 X
6f
o
7 Y
6e
n
7 Z
6d
m
7 !
16
7 "
15
7 #
14
7 $
13
7 %
12
7 &
11
7 '
10
7 (
1f
7 )
1e
7 *
1d
7 +
1c
7 ,
1b
7 -
1a
7 .
19
7 /
18
7 :
0d
7 ;
0c
&#12;
7 <
0b
&#11;
7 =
0a
7 >
09
7 ?
08
7 @
77
w
7 [
6c
l
7 \
6b
k
7 ]
6a
j
7 ^
69
i
7 _
68
h
7 `
57
W
7 {
4c
L
7 |
4b
K
7 }
4a
J
7 ~
49
I

17

3e
>

3d
=

3a
:
7 &#11;
3c
<
7 &#12;
3b
;
8 0
08
8 1
09
8 2
0a
8 3
0b
&#11;
8 4
0c
&#12;
8 5
0d
8 6
0e
8 7
0f
8 8
00
8 9
01
8 a
59
Y
8 b
5a
Z
8 c
5b
[
8 d
5c
\
8 e
5d
]
8 f
5e
^
8 g
5f
_
8 h
50
P
8 i
51
Q
8 j
52
R
8 k
53
S
8 l
54
T
8 m
55
U
8 n
56
V
8 o
57
W
8 p
48
H
8 q
49
I
8 r
4a
J
8 s
4b
K
8 t
4c
L
8 u
4d
M
8 v
4e
N
8 w
4f
O
8 x
40
@
8 y
41
A
8 z
42
B
8 A
79
y
8 B
7a
z
8 C
7b
{
8 D
7c
|
8 E
7d
}
8 F
7e
~
8 G
7f
8 H
70
p
8 I
71
q
8 J
72
r
8 K
73
s
8 L
74
t
8 M
75
u
8 N
76
v
8 O
77
w
8 P
68
h
8 Q
69
i
8 R
6a
j
8 S
6b
k
8 T
6c
l
8 U
6d
m
8 V
6e
n
8 W
6f
o
8 X
60
`
8 Y
61
a
8 Z
62
b
8 !
19
8 "
1a
8 #
1b
8 $
1c
8 %
1d
8 &
1e
8 '
1f
8 (
10
8 )
11
8 *
12
8 +
13
8 ,
14
8 -
15
8 .
16
8 /
17
8 :
02
8 ;
03
8 <
04
8 =
05
8 >
06
8 ?
07
8 @
78
x
8 [
63
c
8 \
64
d
8 ]
65
e
8 ^
66
f
8 _
67
g
8 `
58
X
8 {
43
C
8 |
44
D
8 }
45
E
8 ~
46
F

18

31
1

32
2

35
5
8 &#11;
33
3
8 &#12;
34
4
9 0
09
9 1
08
9 2
0b
&#11;
9 3
0a
9 4
0d
9 5
0c
&#12;
9 6
0f
9 7
0e
9 8
01
9 9
00
9 a
58
X
9 b
5b
[
9 c
5a
Z
9 d
5d
]
9 e
5c
\
9 f
5f
_
9 g
5e
^
9 h
51
Q
9 i
50
P
9 j
53
S
9 k
52
R
9 l
55
U
9 m
54
T
9 n
57
W
9 o
56
V
9 p
49
I
9 q
48
H
9 r
4b
K
9 s
4a
J
9 t
4d
M
9 u
4c
L
9 v
4f
O
9 w
4e
N
9 x
41
A
9 y
40
@
9 z
43
C
9 A
78
x
9 B
7b
{
9 C
7a
z
9 D
7d
}
9 E
7c
|
9 F
7f
9 G
7e
~
9 H
71
q
9 I
70
p
9 J
73
s
9 K
72
r
9 L
75
u
9 M
74
t
9 N
77
w
9 O
76
v
9 P
69
i
9 Q
68
h
9 R
6b
k
9 S
6a
j
9 T
6d
m
9 U
6c
l
9 V
6f
o
9 W
6e
n
9 X
61
a
9 Y
60
`
9 Z
63
c
9 !
18
9 "
1b
9 #
1a
9 $
1d
9 %
1c
9 &
1f
9 '
1e
9 (
11
9 )
10
9 *
13
9 +
12
9 ,
15
9 -
14
9 .
17
9 /
16
9 :
03
9 ;
02
9 <
05
9 =
04
9 >
07
9 ?
06
9 @
79
y
9 [
62
b
9 \
65
e
9 ]
64
d
9 ^
67
g
9 _
66
f
9 `
59
Y
9 {
42
B
9 |
45
E
9 }
44
D
9 ~
47
G

19

30
0

33
3

34
4
9 &#11;
32
2
9 &#12;
35
5
a 0
51
Q
a 1
50
P
a 2
53
S
a 3
52
R
a 4
55
U
a 5
54
T
a 6
57
W
a 7
56
V
a 8
59
Y
a 9
58
X
a a
00
a b
03
a c
02
a d
05
a e
04
a f
07
a g
06
a h
09
a i
08
a j
0b
&#11;
a k
0a
a l
0d
a m
0c
&#12;
a n
0f
a o
0e
a p
11
a q
10
a r
13
a s
12
a t
15
a u
14
a v
17
a w
16
a x
19
a y
18
a z
1b
a A
20
a B
23
#
a C
22
"
a D
25
%
a E
24
$
a F
27
'
a G
26
&
a H
29
)
a I
28
(
a J
2b
+
a K
2a
*
a L
2d
-
a M
2c
,
a N
2f
/
a O
2e
.
a P
31
1
a Q
30
0
a R
33
3
a S
32
2
a T
35
5
a U
34
4
a V
37
7
a W
36
6
a X
39
9
a Y
38
8
a Z
3b
;
a !
40
@
a "
43
C
a #
42
B
a $
45
E
a %
44
D
a &
47
G
a '
46
F
a (
49
I
a )
48
H
a *
4b
K
a +
4a
J
a ,
4d
M
a -
4c
L
a .
4f
O
a /
4e
N
a :
5b
[
a ;
5a
Z
a <
5d
]
a =
5c
\
a >
5f
_
a ?
5e
^
a @
21
!
a [
3a
:
a \
3d
=
a ]
3c
<
a ^
3f
?
a _
3e
>
a `
01
a {
1a
a |
1d
a }
1c
a ~
1f

41
A

68
h

6b
k

6c
l
a &#11;
6a
j
a &#12;
6d
m
b 0
52
R
b 1
53
S
b 2
50
P
b 3
51
Q
b 4
56
V
b 5
57
W
b 6
54
T
b 7
55
U
b 8
5a
Z
b 9
5b
[
b a
03
b b
00
b c
01
b d
06
b e
07
b f
04
b g
05
b h
0a
b i
0b
&#11;
b j
08
b k
09
b l
0e
b m
0f
b n
0c
&#12;
b o
0d
b p
12
b q
13
b r
10
b s
11
b t
16
b u
17
b v
14
b w
15
b x
1a
b y
1b
b z
18
b A
23
#
b B
20
b C
21
!
b D
26
&
b E
27
'
b F
24
$
b G
25
%
b H
2a
*
b I
2b
+
b J
28
(
b K
29
)
b L
2e
.
b M
2f
/
b N
2c
,
b O
2d
-
b P
32
2
b Q
33
3
b R
30
0
b S
31
1
b T
36
6
b U
37
7
b V
34
4
b W
35
5
b X
3a
:
b Y
3b
;
b Z
38
8
b !
43
C
b "
40
@
b #
41
A
b $
46
F
b %
47
G
b &
44
D
b '
45
E
b (
4a
J
b )
4b
K
b *
48
H
b +
49
I
b ,
4e
N
b -
4f
O
b .
4c
L
b /
4d
M
b :
58
X
b ;
59
Y
b <
5e
^
b =
5f
_
b >
5c
\
b ?
5d
]
b @
22
"
b [
39
9
b \
3e
>
b ]
3f
?
b ^
3c
<
b _
3d
=
b `
02
b {
19
b |
1e
b }
1f
b ~
1c

42
B

6b
k

68
h

6f
o
b &#11;
69
i
b &#12;
6e
n
c 0
53
S
c 1
52
R
c 2
51
Q
c 3
50
P
c 4
57
W
c 5
56
V
c 6
55
U
c 7
54
T
c 8
5b
[
c 9
5a
Z
c a
02
c b
01
c c
00
c d
07
c e
06
c f
05
c g
04
c h
0b
&#11;
c i
0a
c j
09
c k
08
c l
0f
c m
0e
c n
0d
c o
0c
&#12;
c p
13
c q
12
c r
11
c s
10
c t
17
c u
16
c v
15
c w
14
c x
1b
c y
1a
c z
19
c A
22
"
c B
21
!
c C
20
c D
27
'
c E
26
&
c F
25
%
c G
24
$
c H
2b
+
c I
2a
*
c J
29
)
c K
28
(
c L
2f
/
c M
2e
.
c N
2d
-
c O
2c
,
c P
33
3
c Q
32
2
c R
31
1
c S
30
0
c T
37
7
c U
36
6
c V
35
5
c W
34
4
c X
3b
;
c Y
3a
:
c Z
39
9
c !
42
B
c "
41
A
c #
40
@
c $
47
G
c %
46
F
c &
45
E
c '
44
D
c (
4b
K
c )
4a
J
c *
49
I
c +
48
H
c ,
4f
O
c -
4e
N
c .
4d
M
c /
4c
L
c :
59
Y
c ;
58
X
c <
5f
_
c =
5e
^
c >
5d
]
c ?
5c
\
c @
23
#
c [
38
8
c \
3f
?
c ]
3e
>
c ^
3d
=
c _
3c
<
c `
03
c {
18
c |
1f
c }
1e
c ~
1d

43
C

6a
j

69
i

6e
n
c &#11;
68
h
c &#12;
6f
o
d 0
54
T
d 1
55
U
d 2
56
V
d 3
57
W
d 4
50
P
d 5
51
Q
d 6
52
R
d 7
53
S
d 8
5c
\
d 9
5d
]
d a
05
d b
06
d c
07
d d
00
d e
01
d f
02
d g
03
d h
0c
&#12;
d i
0d
d j
0e
d k
0f
d l
08
d m
09
d n
0a
d o
0b
&#11;
d p
14
d q
15
d r
16
d s
17
d t
10
d u
11
d v
12
d w
13
d x
1c
d y
1d
d z
1e
d A
25
%
d B
26
&
d C
27
'
d D
20
d E
21
!
d F
22
"
d G
23
#
d H
2c
,
d I
2d
-
d J
2e
.
d K
2f
/
d L
28
(
d M
29
)
d N
2a
*
d O
2b
+
d P
34
4
d Q
35
5
d R
36
6
d S
37
7
d T
30
0
d U
31
1
d V
32
2
d W
33
3
d X
3c
<
d Y
3d
=
d Z
3e
>
d !
45
E
d "
46
F
d #
47
G
d $
40
@
d %
41
A
d &
42
B
d '
43
C
d (
4c
L
d )
4d
M
d *
4e
N
d +
4f
O
d ,
48
H
d -
49
I
d .
4a
J
d /
4b
K
d :
5e
^
d ;
5f
_
d <
58
X
d =
59
Y
d >
5a
Z
d ?
5b
[
d @
24
$
d [
3f
?
d \
38
8
d ]
39
9
d ^
3a
:
d _
3b
;
d `
04
d {
1f
d |
18
d }
19
d ~
1a

44
D

6d
m

6e
n

69
i
d &#11;
6f
o
d &#12;
68
h
e 0
55
U
e 1
54
T
e 2
57
W
e 3
56
V
e 4
51
Q
e 5
50
P
e 6
53
S
e 7
52
R
e 8
5d
]
e 9
5c
\
e a
04
e b
07
e c
06
e d
01
e e
00
e f
03
e g
02
e h
0d
e i
0c
&#12;
e j
0f
e k
0e
e l
09
e m
08
e n
0b
&#11;
e o
0a
e p
15
e q
14
e r
17
e s
16
e t
11
e u
10
e v
13
e w
12
e x
1d
e y
1c
e z
1f
e A
24
$
e B
27
'
e C
26
&
e D
21
!
e E
20
e F
23
#
e G
22
"
e H
2d
-
e I
2c
,
e J
2f
/
e K
2e
.
e L
29
)
e M
28
(
e N
2b
+
e O
2a
*
e P
35
5
e Q
34
4
e R
37
7
e S
36
6
e T
31
1
e U
30
0
e V
33
3
e W
32
2
e X
3d
=
e Y
3c
<
e Z
3f
?
e !
44
D
e "
47
G
e #
46
F
e $
41
A
e %
40
@
e &
43
C
e '
42
B
e (
4d
M
e )
4c
L
e *
4f
O
e +
4e
N
e ,
49
I
e -
48
H
e .
4b
K
e /
4a
J
e :
5f
_
e ;
5e
^
e <
59
Y
e =
58
X
e >
5b
[
e ?
5a
Z
e @
25
%
e [
3e
>
e \
39
9
e ]
38
8
e ^
3b
;
e _
3a
:
e `
05
e {
1e
e |
19
e }
18
e ~
1b

45
E

6c
l

6f
o

68
h
e &#11;
6e
n
e &#12;
69
i
f 0
56
V
f 1
57
W
f 2
54
T
f 3
55
U
f 4
52
R
f 5
53
S
f 6
50
P
f 7
51
Q
f 8
5e
^
f 9
5f
_
f a
07
f b
04
f c
05
f d
02
f e
03
f f
00
f g
01
f h
0e
f i
0f
f j
0c
&#12;
f k
0d
f l
0a
f m
0b
&#11;
f n
08
f o
09
f p
16
f q
17
f r
14
f s
15
f t
12
f u
13
f v
10
f w
11
f x
1e
f y
1f
f z
1c
f A
27
'
f B
24
$
f C
25
%
f D
22
"
f E
23
#
f F
20
f G
21
!
f H
2e
.
f I
2f
/
f J
2c
,
f K
2d
-
f L
2a
*
f M
2b
+
f N
28
(
f O
29
)
f P
36
6
f Q
37
7
f R
34
4
f S
35
5
f T
32
2
f U
33
3
f V
30
0
f W
31
1
f X
3e
>
f Y
3f
?
f Z
3c
<
f !
47
G
f "
44
D
f #
45
E
f $
42
B
f %
43
C
f &
40
@
f '
41
A
f (
4e
N
f )
4f
O
f *
4c
L
f +
4d
M
f ,
4a
J
f -
4b
K
f .
48
H
f /
49
I
f :
5c
\
f ;
5d
]
f <
5a
Z
f =
5b
[
f >
58
X
f ?
59
Y
f @
26
&
f [
3d
=
f \
3a
:
f ]
3b
;
f ^
38
8
f _
39
9
f `
06
f {
1d
f |
1a
f }
1b
f ~
18

46
F

6f
o

6c
l

6b
k
f &#11;
6d
m
f &#12;
6a
j
g 0
57
W
g 1
56
V
g 2
55
U
g 3
54
T
g 4
53
S
g 5
52
R
g 6
51
Q
g 7
50
P
g 8
5f
_
g 9
5e
^
g a
06
g b
05
g c
04
g d
03
g e
02
g f
01
g g
00
g h
0f
g i
0e
g j
0d
g k
0c
&#12;
g l
0b
&#11;
g m
0a
g n
09
g o
08
g p
17
g q
16
g r
15
g s
14
g t
13
g u
12
g v
11
g w
10
g x
1f
g y
1e
g z
1d
g A
26
&
g B
25
%
g C
24
$
g D
23
#
g E
22
"
g F
21
!
g G
20
g H
2f
/
g I
2e
.
g J
2d
-
g K
2c
,
g L
2b
+
g M
2a
*
g N
29
)
g O
28
(
g P
37
7
g Q
36
6
g R
35
5
g S
34
4
g T
33
3
g U
32
2
g V
31
1
g W
30
0
g X
3f
?
g Y
3e
>
g Z
3d
=
g !
46
F
g "
45
E
g #
44
D
g $
43
C
g %
42
B
g &
41
A
g '
40
@
g (
4f
O
g )
4e
N
g *
4d
M
g +
4c
L
g ,
4b
K
g -
4a
J
g .
49
I
g /
48
H
g :
5d
]
g ;
5c
\
g <
5b
[
g =
5a
Z
g >
59
Y
g ?
58
X
g @
27
'
g [
3c
<
g \
3b
;
g ]
3a
:
g ^
39
9
g _
38
8
g `
07
g {
1c
g |
1b
g }
1a
g ~
19

47
G

6e
n

6d
m

6a
j
g &#11;
6c
l
g &#12;
6b
k
h 0
58
X
h 1
59
Y
h 2
5a
Z
h 3
5b
[
h 4
5c
\
h 5
5d
]
h 6
5e
^
h 7
5f
_
h 8
50
P
h 9
51
Q
h a
09
h b
0a
h c
0b
&#11;
h d
0c
&#12;
h e
0d
h f
0e
h g
0f
h h
00
h i
01
h j
02
h k
03
h l
04
h m
05
h n
06
h o
07
h p
18
h q
19
h r
1a
h s
1b
h t
1c
h u
1d
h v
1e
h w
1f
h x
10
h y
11
h z
12
h A
29
)
h B
2a
*
h C
2b
+
h D
2c
,
h E
2d
-
h F
2e
.
h G
2f
/
h H
20
h I
21
!
h J
22
"
h K
23
#
h L
24
$
h M
25
%
h N
26
&
h O
27
'
h P
38
8
h Q
39
9
h R
3a
:
h S
3b
;
h T
3c
<
h U
3d
=
h V
3e
>
h W
3f
?
h X
30
0
h Y
31
1
h Z
32
2
h !
49
I
h "
4a
J
h #
4b
K
h $
4c
L
h %
4d
M
h &
4e
N
h '
4f
O
h (
40
@
h )
41
A
h *
42
B
h +
43
C
h ,
44
D
h -
45
E
h .
46
F
h /
47
G
h :
52
R
h ;
53
S
h <
54
T
h =
55
U
h >
56
V
h ?
57
W
h @
28
(
h [
33
3
h \
34
4
h ]
35
5
h ^
36
6
h _
37
7
h `
08
h {
13
h |
14
h }
15
h ~
16

48
H

61
a

62
b

65
e
h &#11;
63
c
h &#12;
64
d
i 0
59
Y
i 1
58
X
i 2
5b
[
i 3
5a
Z
i 4
5d
]
i 5
5c
\
i 6
5f
_
i 7
5e
^
i 8
51
Q
i 9
50
P
i a
08
i b
0b
&#11;
i c
0a
i d
0d
i e
0c
&#12;
i f
0f
i g
0e
i h
01
i i
00
i j
03
i k
02
i l
05
i m
04
i n
07
i o
06
i p
19
i q
18
i r
1b
i s
1a
i t
1d
i u
1c
i v
1f
i w
1e
i x
11
i y
10
i z
13
i A
28
(
i B
2b
+
i C
2a
*
i D
2d
-
i E
2c
,
i F
2f
/
i G
2e
.
i H
21
!
i I
20
i J
23
#
i K
22
"
i L
25
%
i M
24
$
i N
27
'
i O
26
&
i P
39
9
i Q
38
8
i R
3b
;
i S
3a
:
i T
3d
=
i U
3c
<
i V
3f
?
i W
3e
>
i X
31
1
i Y
30
0
i Z
33
3
i !
48
H
i "
4b
K
i #
4a
J
i $
4d
M
i %
4c
L
i &
4f
O
i '
4e
N
i (
41
A
i )
40
@
i *
43
C
i +
42
B
i ,
45
E
i -
44
D
i .
47
G
i /
46
F
i :
53
S
i ;
52
R
i <
55
U
i =
54
T
i >
57
W
i ?
56
V
i @
29
)
i [
32
2
i \
35
5
i ]
34
4
i ^
37
7
i _
36
6
i `
09
i {
12
i |
15
i }
14
i ~
17

49
I

60
`

63
c

64
d
i &#11;
62
b
i &#12;
65
e
j 0
5a
Z
j 1
5b
[
j 2
58
X
j 3
59
Y
j 4
5e
^
j 5
5f
_
j 6
5c
\
j 7
5d
]
j 8
52
R
j 9
53
S
j a
0b
&#11;
j b
08
j c
09
j d
0e
j e
0f
j f
0c
&#12;
j g
0d
j h
02
j i
03
j j
00
j k
01
j l
06
j m
07
j n
04
j o
05
j p
1a
j q
1b
j r
18
j s
19
j t
1e
j u
1f
j v
1c
j w
1d
j x
12
j y
13
j z
10
j A
2b
+
j B
28
(
j C
29
)
j D
2e
.
j E
2f
/
j F
2c
,
j G
2d
-
j H
22
"
j I
23
#
j J
20
j K
21
!
j L
26
&
j M
27
'
j N
24
$
j O
25
%
j P
3a
:
j Q
3b
;
j R
38
8
j S
39
9
j T
3e
>
j U
3f
?
j V
3c
<
j W
3d
=
j X
32
2
j Y
33
3
j Z
30
0
j !
4b
K
j "
48
H
j #
49
I
j $
4e
N
j %
4f
O
j &
4c
L
j '
4d
M
j (
42
B
j )
43
C
j *
40
@
j +
41
A
j ,
46
F
j -
47
G
j .
44
D
j /
45
E
j :
50
P
j ;
51
Q
j <
56
V
j =
57
W
j >
54
T
j ?
55
U
j @
2a
*
j [
31
1
j \
36
6
j ]
37
7
j ^
34
4
j _
35
5
j `
0a
j {
11
j |
16
j }
17
j ~
14

4a
J

63
c

60
`

67
g
j &#11;
61
a
j &#12;
66
f
k 0
5b
[
k 1
5a
Z
k 2
59
Y
k 3
58
X
k 4
5f
_
k 5
5e
^
k 6
5d
]
k 7
5c
\
k 8
53
S
k 9
52
R
k a
0a
k b
09
k c
08
k d
0f
k e
0e
k f
0d
k g
0c
&#12;
k h
03
k i
02
k j
01
k k
00
k l
07
k m
06
k n
05
k o
04
k p
1b
k q
1a
k r
19
k s
18
k t
1f
k u
1e
k v
1d
k w
1c
k x
13
k y
12
k z
11
k A
2a
*
k B
29
)
k C
28
(
k D
2f
/
k E
2e
.
k F
2d
-
k G
2c
,
k H
23
#
k I
22
"
k J
21
!
k K
20
k L
27
'
k M
26
&
k N
25
%
k O
24
$
k P
3b
;
k Q
3a
:
k R
39
9
k S
38
8
k T
3f
?
k U
3e
>
k V
3d
=
k W
3c
<
k X
33
3
k Y
32
2
k Z
31
1
k !
4a
J
k "
49
I
k #
48
H
k $
4f
O
k %
4e
N
k &
4d
M
k '
4c
L
k (
43
C
k )
42
B
k *
41
A
k +
40
@
k ,
47
G
k -
46
F
k .
45
E
k /
44
D
k :
51
Q
k ;
50
P
k <
57
W
k =
56
V
k >
55
U
k ?
54
T
k @
2b
+
k [
30
0
k \
37
7
k ]
36
6
k ^
35
5
k _
34
4
k `
0b
&#11;
k {
10
k |
17
k }
16
k ~
15

4b
K

62
b

61
a

66
f
k &#11;
60
`
k &#12;
67
g
l 0
5c
\
l 1
5d
]
l 2
5e
^
l 3
5f
_
l 4
58
X
l 5
59
Y
l 6
5a
Z
l 7
5b
[
l 8
54
T
l 9
55
U
l a
0d
l b
0e
l c
0f
l d
08
l e
09
l f
0a
l g
0b
&#11;
l h
04
l i
05
l j
06
l k
07
l l
00
l m
01
l n
02
l o
03
l p
1c
l q
1d
l r
1e
l s
1f
l t
18
l u
19
l v
1a
l w
1b
l x
14
l y
15
l z
16
l A
2d
-
l B
2e
.
l C
2f
/
l D
28
(
l E
29
)
l F
2a
*
l G
2b
+
l H
24
$
l I
25
%
l J
26
&
l K
27
'
l L
20
l M
21
!
l N
22
"
l O
23
#
l P
3c
<
l Q
3d
=
l R
3e
>
l S
3f
?
l T
38
8
l U
39
9
l V
3a
:
l W
3b
;
l X
34
4
l Y
35
5
l Z
36
6
l !
4d
M
l "
4e
N
l #
4f
O
l $
48
H
l %
49
I
l &
4a
J
l '
4b
K
l (
44
D
l )
45
E
l *
46
F
l +
47
G
l ,
40
@
l -
41
A
l .
42
B
l /
43
C
l :
56
V
l ;
57
W
l <
50
P
l =
51
Q
l >
52
R
l ?
53
S
l @
2c
,
l [
37
7
l \
30
0
l ]
31
1
l ^
32
2
l _
33
3
l `
0c
&#12;
l {
17
l |
10
l }
11
l ~
12

4c
L

65
e

66
f

61
a
l &#11;
67
g
l &#12;
60
`
m 0
5d
]
m 1
5c
\
m 2
5f
_
m 3
5e
^
m 4
59
Y
m 5
58
X
m 6
5b
[
m 7
5a
Z
m 8
55
U
m 9
54
T
m a
0c
&#12;
m b
0f
m c
0e
m d
09
m e
08
m f
0b
&#11;
m g
0a
m h
05
m i
04
m j
07
m k
06
m l
01
m m
00
m n
03
m o
02
m p
1d
m q
1c
m r
1f
m s
1e
m t
19
m u
18
m v
1b
m w
1a
m x
15
m y
14
m z
17
m A
2c
,
m B
2f
/
m C
2e
.
m D
29
)
m E
28
(
m F
2b
+
m G
2a
*
m H
25
%
m I
24
$
m J
27
'
m K
26
&
m L
21
!
m M
20
m N
23
#
m O
22
"
m P
3d
=
m Q
3c
<
m R
3f
?
m S
3e
>
m T
39
9
m U
38
8
m V
3b
;
m W
3a
:
m X
35
5
m Y
34
4
m Z
37
7
m !
4c
L
m "
4f
O
m #
4e
N
m $
49
I
m %
48
H
m &
4b
K
m '
4a
J
m (
45
E
m )
44
D
m *
47
G
m +
46
F
m ,
41
A
m -
40
@
m .
43
C
m /
42
B
m :
57
W
m ;
56
V
m <
51
Q
m =
50
P
m >
53
S
m ?
52
R
m @
2d
-
m [
36
6
m \
31
1
m ]
30
0
m ^
33
3
m _
32
2
m `
0d
m {
16
m |
11
m }
10
m ~
13

4d
M

64
d

67
g

60
`
m &#11;
66
f
m &#12;
61
a
n 0
5e
^
n 1
5f
_
n 2
5c
\
n 3
5d
]
n 4
5a
Z
n 5
5b
[
n 6
58
X
n 7
59
Y
n 8
56
V
n 9
57
W
n a
0f
n b
0c
&#12;
n c
0d
n d
0a
n e
0b
&#11;
n f
08
n g
09
n h
06
n i
07
n j
04
n k
05
n l
02
n m
03
n n
00
n o
01
n p
1e
n q
1f
n r
1c
n s
1d
n t
1a
n u
1b
n v
18
n w
19
n x
16
n y
17
n z
14
n A
2f
/
n B
2c
,
n C
2d
-
n D
2a
*
n E
2b
+
n F
28
(
n G
29
)
n H
26
&
n I
27
'
n J
24
$
n K
25
%
n L
22
"
n M
23
#
n N
20
n O
21
!
n P
3e
>
n Q
3f
?
n R
3c
<
n S
3d
=
n T
3a
:
n U
3b
;
n V
38
8
n W
39
9
n X
36
6
n Y
37
7
n Z
34
4
n !
4f
O
n "
4c
L
n #
4d
M
n $
4a
J
n %
4b
K
n &
48
H
n '
49
I
n (
46
F
n )
47
G
n *
44
D
n +
45
E
n ,
42
B
n -
43
C
n .
40
@
n /
41
A
n :
54
T
n ;
55
U
n <
52
R
n =
53
S
n >
50
P
n ?
51
Q
n @
2e
.
n [
35
5
n \
32
2
n ]
33
3
n ^
30
0
n _
31
1
n `
0e
n {
15
n |
12
n }
13
n ~
10

4e
N

67
g

64
d

63
c
n &#11;
65
e
n &#12;
62
b
o 0
5f
_
o 1
5e
^
o 2
5d
]
o 3
5c
\
o 4
5b
[
o 5
5a
Z
o 6
59
Y
o 7
58
X
o 8
57
W
o 9
56
V
o a
0e
o b
0d
o c
0c
&#12;
o d
0b
&#11;
o e
0a
o f
09
o g
08
o h
07
o i
06
o j
05
o k
04
o l
03
o m
02
o n
01
o o
00
o p
1f
o q
1e
o r
1d
o s
1c
o t
1b
o u
1a
o v
19
o w
18
o x
17
o y
16
o z
15
o A
2e
.
o B
2d
-
o C
2c
,
o D
2b
+
o E
2a
*
o F
29
)
o G
28
(
o H
27
'
o I
26
&
o J
25
%
o K
24
$
o L
23
#
o M
22
"
o N
21
!
o O
20
o P
3f
?
o Q
3e
>
o R
3d
=
o S
3c
<
o T
3b
;
o U
3a
:
o V
39
9
o W
38
8
o X
37
7
o Y
36
6
o Z
35
5
o !
4e
N
o "
4d
M
o #
4c
L
o $
4b
K
o %
4a
J
o &
49
I
o '
48
H
o (
47
G
o )
46
F
o *
45
E
o +
44
D
o ,
43
C
o -
42
B
o .
41
A
o /
40
@
o :
55
U
o ;
54
T
o <
53
S
o =
52
R
o >
51
Q
o ?
50
P
o @
2f
/
o [
34
4
o \
33
3
o ]
32
2
o ^
31
1
o _
30
0
o `
0f
o {
14
o |
13
o }
12
o ~
11

4f
O

66
f

65
e

62
b
o &#11;
64
d
o &#12;
63
c
p 0
40
@
p 1
41
A
p 2
42
B
p 3
43
C
p 4
44
D
p 5
45
E
p 6
46
F
p 7
47
G
p 8
48
H
p 9
49
I
p a
11
p b
12
p c
13
p d
14
p e
15
p f
16
p g
17
p h
18
p i
19
p j
1a
p k
1b
p l
1c
p m
1d
p n
1e
p o
1f
p p
00
p q
01
p r
02
p s
03
p t
04
p u
05
p v
06
p w
07
p x
08
p y
09
p z
0a
p A
31
1
p B
32
2
p C
33
3
p D
34
4
p E
35
5
p F
36
6
p G
37
7
p H
38
8
p I
39
9
p J
3a
:
p K
3b
;
p L
3c
<
p M
3d
=
p N
3e
>
p O
3f
?
p P
20
p Q
21
!
p R
22
"
p S
23
#
p T
24
$
p U
25
%
p V
26
&
p W
27
'
p X
28
(
p Y
29
)
p Z
2a
*
p !
51
Q
p "
52
R
p #
53
S
p $
54
T
p %
55
U
p &
56
V
p '
57
W
p (
58
X
p )
59
Y
p *
5a
Z
p +
5b
[
p ,
5c
\
p -
5d
]
p .
5e
^
p /
5f
_
p :
4a
J
p ;
4b
K
p <
4c
L
p =
4d
M
p >
4e
N
p ?
4f
O
p @
30
0
p [
2b
+
p \
2c
,
p ]
2d
-
p ^
2e
.
p _
2f
/
p `
10
p {
0b
&#11;
p |
0c
&#12;
p }
0d
p ~
0e

50
P

79
y

7a
z

7d
}
p &#11;
7b
{
p &#12;
7c
|
q 0
41
A
q 1
40
@
q 2
43
C
q 3
42
B
q 4
45
E
q 5
44
D
q 6
47
G
q 7
46
F
q 8
49
I
q 9
48
H
q a
10
q b
13
q c
12
q d
15
q e
14
q f
17
q g
16
q h
19
q i
18
q j
1b
q k
1a
q l
1d
q m
1c
q n
1f
q o
1e
q p
01
q q
00
q r
03
q s
02
q t
05
q u
04
q v
07
q w
06
q x
09
q y
08
q z
0b
&#11;
q A
30
0
q B
33
3
q C
32
2
q D
35
5
q E
34
4
q F
37
7
q G
36
6
q H
39
9
q I
38
8
q J
3b
;
q K
3a
:
q L
3d
=
q M
3c
<
q N
3f
?
q O
3e
>
q P
21
!
q Q
20
q R
23
#
q S
22
"
q T
25
%
q U
24
$
q V
27
'
q W
26
&
q X
29
)
q Y
28
(
q Z
2b
+
q !
50
P
q "
53
S
q #
52
R
q $
55
U
q %
54
T
q &
57
W
q '
56
V
q (
59
Y
q )
58
X
q *
5b
[
q +
5a
Z
q ,
5d
]
q -
5c
\
q .
5f
_
q /
5e
^
q :
4b
K
q ;
4a
J
q <
4d
M
q =
4c
L
q >
4f
O
q ?
4e
N
q @
31
1
q [
2a
*
q \
2d
-
q ]
2c
,
q ^
2f
/
q _
2e
.
q `
11
q {
0a
q |
0d
q }
0c
&#12;
q ~
0f

51
Q

78
x

7b
{

7c
|
q &#11;
7a
z
q &#12;
7d
}
r 0
42
B
r 1
43
C
r 2
40
@
r 3
41
A
r 4
46
F
r 5
47
G
r 6
44
D
r 7
45
E
r 8
4a
J
r 9
4b
K
r a
13
r b
10
r c
11
r d
16
r e
17
r f
14
r g
15
r h
1a
r i
1b
r j
18
r k
19
r l
1e
r m
1f
r n
1c
r o
1d
r p
02
r q
03
r r
00
r s
01
r t
06
r u
07
r v
04
r w
05
r x
0a
r y
0b
&#11;
r z
08
r A
33
3
r B
30
0
r C
31
1
r D
36
6
r E
37
7
r F
34
4
r G
35
5
r H
3a
:
r I
3b
;
r J
38
8
r K
39
9
r L
3e
>
r M
3f
?
r N
3c
<
r O
3d
=
r P
22
"
r Q
23
#
r R
20
r S
21
!
r T
26
&
r U
27
'
r V
24
$
r W
25
%
r X
2a
*
r Y
2b
+
r Z
28
(
r !
53
S
r "
50
P
r #
51
Q
r $
56
V
r %
57
W
r &
54
T
r '
55
U
r (
5a
Z
r )
5b
[
r *
58
X
r +
59
Y
r ,
5e
^
r -
5f
_
r .
5c
\
r /
5d
]
r :
48
H
r ;
49
I
r <
4e
N
r =
4f
O
r >
4c
L
r ?
4d
M
r @
32
2
r [
29
)
r \
2e
.
r ]
2f
/
r ^
2c
,
r _
2d
-
r `
12
r {
09
r |
0e
r }
0f
r ~
0c
&#12;

52
R

7b
{

78
x

7f
r &#11;
79
y
r &#12;
7e
~
s 0
43
C
s 1
42
B
s 2
41
A
s 3
40
@
s 4
47
G
s 5
46
F
s 6
45
E
s 7
44
D
s 8
4b
K
s 9
4a
J
s a
12
s b
11
s c
10
s d
17
s e
16
s f
15
s g
14
s h
1b
s i
1a
s j
19
s k
18
s l
1f
s m
1e
s n
1d
s o
1c
s p
03
s q
02
s r
01
s s
00
s t
07
s u
06
s v
05
s w
04
s x
0b
&#11;
s y
0a
s z
09
s A
32
2
s B
31
1
s C
30
0
s D
37
7
s E
36
6
s F
35
5
s G
34
4
s H
3b
;
s I
3a
:
s J
39
9
s K
38
8
s L
3f
?
s M
3e
>
s N
3d
=
s O
3c
<
s P
23
#
s Q
22
"
s R
21
!
s S
20
s T
27
'
s U
26
&
s V
25
%
s W
24
$
s X
2b
+
s Y
2a
*
s Z
29
)
s !
52
R
s "
51
Q
s #
50
P
s $
57
W
s %
56
V
s &
55
U
s '
54
T
s (
5b
[
s )
5a
Z
s *
59
Y
s +
58
X
s ,
5f
_
s -
5e
^
s .
5d
]
s /
5c
\
s :
49
I
s ;
48
H
s <
4f
O
s =
4e
N
s >
4d
M
s ?
4c
L
s @
33
3
s [
28
(
s \
2f
/
s ]
2e
.
s ^
2d
-
s _
2c
,
s `
13
s {
08
s |
0f
s }
0e
s ~
0d

53
S

7a
z

79
y

7e
~
s &#11;
78
x
s &#12;
7f
t 0
44
D
t 1
45
E
t 2
46
F
t 3
47
G
t 4
40
@
t 5
41
A
t 6
42
B
t 7
43
C
t 8
4c
L
t 9
4d
M
t a
15
t b
16
t c
17
t d
10
t e
11
t f
12
t g
13
t h
1c
t i
1d
t j
1e
t k
1f
t l
18
t m
19
t n
1a
t o
1b
t p
04
t q
05
t r
06
t s
07
t t
00
t u
01
t v
02
t w
03
t x
0c
&#12;
t y
0d
t z
0e
t A
35
5
t B
36
6
t C
37
7
t D
30
0
t E
31
1
t F
32
2
t G
33
3
t H
3c
<
t I
3d
=
t J
3e
>
t K
3f
?
t L
38
8
t M
39
9
t N
3a
:
t O
3b
;
t P
24
$
t Q
25
%
t R
26
&
t S
27
'
t T
20
t U
21
!
t V
22
"
t W
23
#
t X
2c
,
t Y
2d
-
t Z
2e
.
t !
55
U
t "
56
V
t #
57
W
t $
50
P
t %
51
Q
t &
52
R
t '
53
S
t (
5c
\
t )
5d
]
t *
5e
^
t +
5f
_
t ,
58
X
t -
59
Y
t .
5a
Z
t /
5b
[
t :
4e
N
t ;
4f
O
t <
48
H
t =
49
I
t >
4a
J
t ?
4b
K
t @
34
4
t [
2f
/
t \
28
(
t ]
29
)
t ^
2a
*
t _
2b
+
t `
14
t {
0f
t |
08
t }
09
t ~
0a

54
T

7d
}

7e
~

79
y
t &#11;
7f
t &#12;
78
x
u 0
45
E
u 1
44
D
u 2
47
G
u 3
46
F
u 4
41
A
u 5
40
@
u 6
43
C
u 7
42
B
u 8
4d
M
u 9
4c
L
u a
14
u b
17
u c
16
u d
11
u e
10
u f
13
u g
12
u h
1d
u i
1c
u j
1f
u k
1e
u l
19
u m
18
u n
1b
u o
1a
u p
05
u q
04
u r
07
u s
06
u t
01
u u
00
u v
03
u w
02
u x
0d
u y
0c
&#12;
u z
0f
u A
34
4
u B
37
7
u C
36
6
u D
31
1
u E
30
0
u F
33
3
u G
32
2
u H
3d
=
u I
3c
<
u J
3f
?
u K
3e
>
u L
39
9
u M
38
8
u N
3b
;
u O
3a
:
u P
25
%
u Q
24
$
u R
27
'
u S
26
&
u T
21
!
u U
20
u V
23
#
u W
22
"
u X
2d
-
u Y
2c
,
u Z
2f
/
u !
54
T
u "
57
W
u #
56
V
u $
51
Q
u %
50
P
u &
53
S
u '
52
R
u (
5d
]
u )
5c
\
u *
5f
_
u +
5e
^
u ,
59
Y
u -
58
X
u .
5b
[
u /
5a
Z
u :
4f
O
u ;
4e
N
u <
49
I
u =
48
H
u >
4b
K
u ?
4a
J
u @
35
5
u [
2e
.
u \
29
)
u ]
28
(
u ^
2b
+
u _
2a
*
u `
15
u {
0e
u |
09
u }
08
u ~
0b
&#11;

55
U

7c
|

7f

78
x
u &#11;
7e
~
u &#12;
79
y
v 0
46
F
v 1
47
G
v 2
44
D
v 3
45
E
v 4
42
B
v 5
43
C
v 6
40
@
v 7
41
A
v 8
4e
N
v 9
4f
O
v a
17
v b
14
v c
15
v d
12
v e
13
v f
10
v g
11
v h
1e
v i
1f
v j
1c
v k
1d
v l
1a
v m
1b
v n
18
v o
19
v p
06
v q
07
v r
04
v s
05
v t
02
v u
03
v v
00
v w
01
v x
0e
v y
0f
v z
0c
&#12;
v A
37
7
v B
34
4
v C
35
5
v D
32
2
v E
33
3
v F
30
0
v G
31
1
v H
3e
>
v I
3f
?
v J
3c
<
v K
3d
=
v L
3a
:
v M
3b
;
v N
38
8
v O
39
9
v P
26
&
v Q
27
'
v R
24
$
v S
25
%
v T
22
"
v U
23
#
v V
20
v W
21
!
v X
2e
.
v Y
2f
/
v Z
2c
,
v !
57
W
v "
54
T
v #
55
U
v $
52
R
v %
53
S
v &
50
P
v '
51
Q
v (
5e
^
v )
5f
_
v *
5c
\
v +
5d
]
v ,
5a
Z
v -
5b
[
v .
58
X
v /
59
Y
v :
4c
L
v ;
4d
M
v <
4a
J
v =
4b
K
v >
48
H
v ?
49
I
v @
36
6
v [
2d
-
v \
2a
*
v ]
2b
+
v ^
28
(
v _
29
)
v `
16
v {
0d
v |
0a
v }
0b
&#11;
v ~
08

56
V

7f

7c
|

7b
{
v &#11;
7d
}
v &#12;
7a
z
w 0
47
G
w 1
46
F
w 2
45
E
w 3
44
D
w 4
43
C
w 5
42
B
w 6
41
A
w 7
40
@
w 8
4f
O
w 9
4e
N
w a
16
w b
15
w c
14
w d
13
w e
12
w f
11
w g
10
w h
1f
w i
1e
w j
1d
w k
1c
w l
1b
w m
1a
w n
19
w o
18
w p
07
w q
06
w r
05
w s
04
w t
03
w u
02
w v
01
w w
00
w x
0f
w y
0e
w z
0d
w A
36
6
w B
35
5
w C
34
4
w D
33
3
w E
32
2
w F
31
1
w G
30
0
w H
3f
?
w I
3e
>
w J
3d
=
w K
3c
<
w L
3b
;
w M
3a
:
w N
39
9
w O
38
8
w P
27
'
w Q
26
&
w R
25
%
w S
24
$
w T
23
#
w U
22
"
w V
21
!
w W
20
w X
2f
/
w Y
2e
.
w Z
2d
-
w !
56
V
w "
55
U
w #
54
T
w $
53
S
w %
52
R
w &
51
Q
w '
50
P
w (
5f
_
w )
5e
^
w *
5d
]
w +
5c
\
w ,
5b
[
w -
5a
Z
w .
59
Y
w /
58
X
w :
4d
M
w ;
4c
L
w <
4b
K
w =
4a
J
w >
49
I
w ?
48
H
w @
37
7
w [
2c
,
w \
2b
+
w ]
2a
*
w ^
29
)
w _
28
(
w `
17
w {
0c
&#12;
w |
0b
&#11;
w }
0a
w ~
09

57
W

7e
~

7d
}

7a
z
w &#11;
7c
|
w &#12;
7b
{
x 0
48
H
x 1
49
I
x 2
4a
J
x 3
4b
K
x 4
4c
L
x 5
4d
M
x 6
4e
N
x 7
4f
O
x 8
40
@
x 9
41
A
x a
19
x b
1a
x c
1b
x d
1c
x e
1d
x f
1e
x g
1f
x h
10
x i
11
x j
12
x k
13
x l
14
x m
15
x n
16
x o
17
x p
08
x q
09
x r
0a
x s
0b
&#11;
x t
0c
&#12;
x u
0d
x v
0e
x w
0f
x x
00
x y
01
x z
02
x A
39
9
x B
3a
:
x C
3b
;
x D
3c
<
x E
3d
=
x F
3e
>
x G
3f
?
x H
30
0
x I
31
1
x J
32
2
x K
33
3
x L
34
4
x M
35
5
x N
36
6
x O
37
7
x P
28
(
x Q
29
)
x R
2a
*
x S
2b
+
x T
2c
,
x U
2d
-
x V
2e
.
x W
2f
/
x X
20
x Y
21
!
x Z
22
"
x !
59
Y
x "
5a
Z
x #
5b
[
x $
5c
\
x %
5d
]
x &
5e
^
x '
5f
_
x (
50
P
x )
51
Q
x *
52
R
x +
53
S
x ,
54
T
x -
55
U
x .
56
V
x /
57
W
x :
42
B
x ;
43
C
x <
44
D
x =
45
E
x >
46
F
x ?
47
G
x @
38
8
x [
23
#
x \
24
$
x ]
25
%
x ^
26
&
x _
27
'
x `
18
x {
03
x |
04
x }
05
x ~
06

58
X

71
q

72
r

75
u
x &#11;
73
s
x &#12;
74
t
y 0
49
I
y 1
48
H
y 2
4b
K
y 3
4a
J
y 4
4d
M
y 5
4c
L
y 6
4f
O
y 7
4e
N
y 8
41
A
y 9
40
@
y a
18
y b
1b
y c
1a
y d
1d
y e
1c
y f
1f
y g
1e
y h
11
y i
10
y j
13
y k
12
y l
15
y m
14
y n
17
y o
16
y p
09
y q
08
y r
0b
&#11;
y s
0a
y t
0d
y u
0c
&#12;
y v
0f
y w
0e
y x
01
y y
00
y z
03
y A
38
8
y B
3b
;
y C
3a
:
y D
3d
=
y E
3c
<
y F
3f
?
y G
3e
>
y H
31
1
y I
30
0
y J
33
3
y K
32
2
y L
35
5
y M
34
4
y N
37
7
y O
36
6
y P
29
)
y Q
28
(
y R
2b
+
y S
2a
*
y T
2d
-
y U
2c
,
y V
2f
/
y W
2e
.
y X
21
!
y Y
20
y Z
23
#
y !
58
X
y "
5b
[
y #
5a
Z
y $
5d
]
y %
5c
\
y &
5f
_
y '
5e
^
y (
51
Q
y )
50
P
y *
53
S
y +
52
R
y ,
55
U
y -
54
T
y .
57
W
y /
56
V
y :
43
C
y ;
42
B
y <
45
E
y =
44
D
y >
47
G
y ?
46
F
y @
39
9
y [
22
"
y \
25
%
y ]
24
$
y ^
27
'
y _
26
&
y `
19
y {
02
y |
05
y }
04
y ~
07

59
Y

70
p

73
s

74
t
y &#11;
72
r
y &#12;
75
u
z 0
4a
J
z 1
4b
K
z 2
48
H
z 3
49
I
z 4
4e
N
z 5
4f
O
z 6
4c
L
z 7
4d
M
z 8
42
B
z 9
43
C
z a
1b
z b
18
z c
19
z d
1e
z e
1f
z f
1c
z g
1d
z h
12
z i
13
z j
10
z k
11
z l
16
z m
17
z n
14
z o
15
z p
0a
z q
0b
&#11;
z r
08
z s
09
z t
0e
z u
0f
z v
0c
&#12;
z w
0d
z x
02
z y
03
z z
00
z A
3b
;
z B
38
8
z C
39
9
z D
3e
>
z E
3f
?
z F
3c
<
z G
3d
=
z H
32
2
z I
33
3
z J
30
0
z K
31
1
z L
36
6
z M
37
7
z N
34
4
z O
35
5
z P
2a
*
z Q
2b
+
z R
28
(
z S
29
)
z T
2e
.
z U
2f
/
z V
2c
,
z W
2d
-
z X
22
"
z Y
23
#
z Z
20
z !
5b
[
z "
58
X
z #
59
Y
z $
5e
^
z %
5f
_
z &
5c
\
z '
5d
]
z (
52
R
z )
53
S
z *
50
P
z +
51
Q
z ,
56
V
z -
57
W
z .
54
T
z /
55
U
z :
40
@
z ;
41
A
z <
46
F
z =
47
G
z >
44
D
z ?
45
E
z @
3a
:
z [
21
!
z \
26
&
z ]
27
'
z ^
24
$
z _
25
%
z `
1a
z {
01
z |
06
z }
07
z ~
04

5a
Z

73
s

70
p

77
w
z &#11;
71
q
z &#12;
76
v
A 0
71
q
A 1
70
p
A 2
73
s
A 3
72
r
A 4
75
u
A 5
74
t
A 6
77
w
A 7
76
v
A 8
79
y
A 9
78
x
A a
20
A b
23
#
A c
22
"
A d
25
%
A e
24
$
A f
27
'
A g
26
&
A h
29
)
A i
28
(
A j
2b
+
A k
2a
*
A l
2d
-
A m
2c
,
A n
2f
/
A o
2e
.
A p
31
1
A q
30
0
A r
33
3
A s
32
2
A t
35
5
A u
34
4
A v
37
7
A w
36
6
A x
39
9
A y
38
8
A z
3b
;
A A
00
A B
03
A C
02
A D
05
A E
04
A F
07
A G
06
A H
09
A I
08
A J
0b
&#11;
A K
0a
A L
0d
A M
0c
&#12;
A N
0f
A O
0e
A P
11
A Q
10
A R
13
A S
12
A T
15
A U
14
A V
17
A W
16
A X
19
A Y
18
A Z
1b
A !
60
`
A "
63
c
A #
62
b
A $
65
e
A %
64
d
A &
67
g
A '
66
f
A (
69
i
A )
68
h
A *
6b
k
A +
6a
j
A ,
6d
m
A -
6c
l
A .
6f
o
A /
6e
n
A :
7b
{
A ;
7a
z
A <
7d
}
A =
7c
|
A >
7f
A ?
7e
~
A @
01
A [
1a
A \
1d
A ]
1c
A ^
1f
A _
1e
A `
21
!
A {
3a
:
A |
3d
=
A }
3c
<
A ~
3f
?

61
a

48
H

4b
K

4c
L
A &#11;
4a
J
A &#12;
4d
M
B 0
72
r
B 1
73
s
B 2
70
p
B 3
71
q
B 4
76
v
B 5
77
w
B 6
74
t
B 7
75
u
B 8
7a
z
B 9
7b
{
B a
23
#
B b
20
B c
21
!
B d
26
&
B e
27
'
B f
24
$
B g
25
%
B h
2a
*
B i
2b
+
B j
28
(
B k
29
)
B l
2e
.
B m
2f
/
B n
2c
,
B o
2d
-
B p
32
2
B q
33
3
B r
30
0
B s
31
1
B t
36
6
B u
37
7
B v
34
4
B w
35
5
B x
3a
:
B y
3b
;
B z
38
8
B A
03
B B
00
B C
01
B D
06
B E
07
B F
04
B G
05
B H
0a
B I
0b
&#11;
B J
08
B K
09
B L
0e
B M
0f
B N
0c
&#12;
B O
0d
B P
12
B Q
13
B R
10
B S
11
B T
16
B U
17
B V
14
B W
15
B X
1a
B Y
1b
B Z
18
B !
63
c
B "
60
`
B #
61
a
B $
66
f
B %
67
g
B &
64
d
B '
65
e
B (
6a
j
B )
6b
k
B *
68
h
B +
69
i
B ,
6e
n
B -
6f
o
B .
6c
l
B /
6d
m
B :
78
x
B ;
79
y
B <
7e
~
B =
7f
B >
7c
|
B ?
7d
}
B @
02
B [
19
B \
1e
B ]
1f
B ^
1c
B _
1d
B `
22
"
B {
39
9
B |
3e
>
B }
3f
?
B ~
3c
<

62
b

4b
K

48
H

4f
O
B &#11;
49
I
B &#12;
4e
N
C 0
73
s
C 1
72
r
C 2
71
q
C 3
70
p
C 4
77
w
C 5
76
v
C 6
75
u
C 7
74
t
C 8
7b
{
C 9
7a
z
C a
22
"
C b
21
!
C c
20
C d
27
'
C e
26
&
C f
25
%
C g
24
$
C h
2b
+
C i
2a
*
C j
29
)
C k
28
(
C l
2f
/
C m
2e
.
C n
2d
-
C o
2c
,
C p
33
3
C q
32
2
C r
31
1
C s
30
0
C t
37
7
C u
36
6
C v
35
5
C w
34
4
C x
3b
;
C y
3a
:
C z
39
9
C A
02
C B
01
C C
00
C D
07
C E
06
C F
05
C G
04
C H
0b
&#11;
C I
0a
C J
09
C K
08
C L
0f
C M
0e
C N
0d
C O
0c
&#12;
C P
13
C Q
12
C R
11
C S
10
C T
17
C U
16
C V
15
C W
14
C X
1b
C Y
1a
C Z
19
C !
62
b
C "
61
a
C #
60
`
C $
67
g
C %
66
f
C &
65
e
C '
64
d
C (
6b
k
C )
6a
j
C *
69
i
C +
68
h
C ,
6f
o
C -
6e
n
C .
6d
m
C /
6c
l
C :
79
y
C ;
78
x
C <
7f
C =
7e
~
C >
7d
}
C ?
7c
|
C @
03
C [
18
C \
1f
C ]
1e
C ^
1d
C _
1c
C `
23
#
C {
38
8
C |
3f
?
C }
3e
>
C ~
3d
=

63
c

4a
J

49
I

4e
N
C &#11;
48
H
C &#12;
4f
O
D 0
74
t
D 1
75
u
D 2
76
v
D 3
77
w
D 4
70
p
D 5
71
q
D 6
72
r
D 7
73
s
D 8
7c
|
D 9
7d
}
D a
25
%
D b
26
&
D c
27
'
D d
20
D e
21
!
D f
22
"
D g
23
#
D h
2c
,
D i
2d
-
D j
2e
.
D k
2f
/
D l
28
(
D m
29
)
D n
2a
*
D o
2b
+
D p
34
4
D q
35
5
D r
36
6
D s
37
7
D t
30
0
D u
31
1
D v
32
2
D w
33
3
D x
3c
<
D y
3d
=
D z
3e
>
D A
05
D B
06
D C
07
D D
00
D E
01
D F
02
D G
03
D H
0c
&#12;
D I
0d
D J
0e
D K
0f
D L
08
D M
09
D N
0a
D O
0b
&#11;
D P
14
D Q
15
D R
16
D S
17
D T
10
D U
11
D V
12
D W
13
D X
1c
D Y
1d
D Z
1e
D !
65
e
D "
66
f
D #
67
g
D $
60
`
D %
61
a
D &
62
b
D '
63
c
D (
6c
l
D )
6d
m
D *
6e
n
D +
6f
o
D ,
68
h
D -
69
i
D .
6a
j
D /
6b
k
D :
7e
~
D ;
7f
D <
78
x
D =
79
y
D >
7a
z
D ?
7b
{
D @
04
D [
1f
D \
18
D ]
19
D ^
1a
D _
1b
D `
24
$
D {
3f
?
D |
38
8
D }
39
9
D ~
3a
:

64
d

4d
M

4e
N

49
I
D &#11;
4f
O
D &#12;
48
H
E 0
75
u
E 1
74
t
E 2
77
w
E 3
76
v
E 4
71
q
E 5
70
p
E 6
73
s
E 7
72
r
E 8
7d
}
E 9
7c
|
E a
24
$
E b
27
'
E c
26
&
E d
21
!
E e
20
E f
23
#
E g
22
"
E h
2d
-
E i
2c
,
E j
2f
/
E k
2e
.
E l
29
)
E m
28
(
E n
2b
+
E o
2a
*
E p
35
5
E q
34
4
E r
37
7
E s
36
6
E t
31
1
E u
30
0
E v
33
3
E w
32
2
E x
3d
=
E y
3c
<
E z
3f
?
E A
04
E B
07
E C
06
E D
01
E E
00
E F
03
E G
02
E H
0d
E I
0c
&#12;
E J
0f
E K
0e
E L
09
E M
08
E N
0b
&#11;
E O
0a
E P
15
E Q
14
E R
17
E S
16
E T
11
E U
10
E V
13
E W
12
E X
1d
E Y
1c
E Z
1f
E !
64
d
E "
67
g
E #
66
f
E $
61
a
E %
60
`
E &
63
c
E '
62
b
E (
6d
m
E )
6c
l
E *
6f
o
E +
6e
n
E ,
69
i
E -
68
h
E .
6b
k
E /
6a
j
E :
7f
E ;
7e
~
E <
79
y
E =
78
x
E >
7b
{
E ?
7a
z
E @
05
E [
1e
E \
19
E ]
18
E ^
1b
E _
1a
E `
25
%
E {
3e
>
E |
39
9
E }
38
8
E ~
3b
;

65
e

4c
L

4f
O

48
H
E &#11;
4e
N
E &#12;
49
I
F 0
76
v
F 1
77
w
F 2
74
t
F 3
75
u
F 4
72
r
F 5
73
s
F 6
70
p
F 7
71
q
F 8
7e
~
F 9
7f
F a
27
'
F b
24
$
F c
25
%
F d
22
"
F e
23
#
F f
20
F g
21
!
F h
2e
.
F i
2f
/
F j
2c
,
F k
2d
-
F l
2a
*
F m
2b
+
F n
28
(
F o
29
)
F p
36
6
F q
37
7
F r
34
4
F s
35
5
F t
32
2
F u
33
3
F v
30
0
F w
31
1
F x
3e
>
F y
3f
?
F z
3c
<
F A
07
F B
04
F C
05
F D
02
F E
03
F F
00
F G
01
F H
0e
F I
0f
F J
0c
&#12;
F K
0d
F L
0a
F M
0b
&#11;
F N
08
F O
09
F P
16
F Q
17
F R
14
F S
15
F T
12
F U
13
F V
10
F W
11
F X
1e
F Y
1f
F Z
1c
F !
67
g
F "
64
d
F #
65
e
F $
62
b
F %
63
c
F &
60
`
F '
61
a
F (
6e
n
F )
6f
o
F *
6c
l
F +
6d
m
F ,
6a
j
F -
6b
k
F .
68
h
F /
69
i
F :
7c
|
F ;
7d
}
F <
7a
z
F =
7b
{
F >
78
x
F ?
79
y
F @
06
F [
1d
F \
1a
F ]
1b
F ^
18
F _
19
F `
26
&
F {
3d
=
F |
3a
:
F }
3b
;
F ~
38
8

66
f

4f
O

4c
L

4b
K
F &#11;
4d
M
F &#12;
4a
J
G 0
77
w
G 1
76
v
G 2
75
u
G 3
74
t
G 4
73
s
G 5
72
r
G 6
71
q
G 7
70
p
G 8
7f
G 9
7e
~
G a
26
&
G b
25
%
G c
24
$
G d
23
#
G e
22
"
G f
21
!
G g
20
G h
2f
/
G i
2e
.
G j
2d
-
G k
2c
,
G l
2b
+
G m
2a
*
G n
29
)
G o
28
(
G p
37
7
G q
36
6
G r
35
5
G s
34
4
G t
33
3
G u
32
2
G v
31
1
G w
30
0
G x
3f
?
G y
3e
>
G z
3d
=
G A
06
G B
05
G C
04
G D
03
G E
02
G F
01
G G
00
G H
0f
G I
0e
G J
0d
G K
0c
&#12;
G L
0b
&#11;
G M
0a
G N
09
G O
08
G P
17
G Q
16
G R
15
G S
14
G T
13
G U
12
G V
11
G W
10
G X
1f
G Y
1e
G Z
1d
G !
66
f
G "
65
e
G #
64
d
G $
63
c
G %
62
b
G &
61
a
G '
60
`
G (
6f
o
G )
6e
n
G *
6d
m
G +
6c
l
G ,
6b
k
G -
6a
j
G .
69
i
G /
68
h
G :
7d
}
G ;
7c
|
G <
7b
{
G =
7a
z
G >
79
y
G ?
78
x
G @
07
G [
1c
G \
1b
G ]
1a
G ^
19
G _
18
G `
27
'
G {
3c
<
G |
3b
;
G }
3a
:
G ~
39
9

67
g

4e
N

4d
M

4a
J
G &#11;
4c
L
G &#12;
4b
K
H 0
78
x
H 1
79
y
H 2
7a
z
H 3
7b
{
H 4
7c
|
H 5
7d
}
H 6
7e
~
H 7
7f
H 8
70
p
H 9
71
q
H a
29
)
H b
2a
*
H c
2b
+
H d
2c
,
H e
2d
-
H f
2e
.
H g
2f
/
H h
20
H i
21
!
H j
22
"
H k
23
#
H l
24
$
H m
25
%
H n
26
&
H o
27
'
H p
38
8
H q
39
9
H r
3a
:
H s
3b
;
H t
3c
<
H u
3d
=
H v
3e
>
H w
3f
?
H x
30
0
H y
31
1
H z
32
2
H A
09
H B
0a
H C
0b
&#11;
H D
0c
&#12;
H E
0d
H F
0e
H G
0f
H H
00
H I
01
H J
02
H K
03
H L
04
H M
05
H N
06
H O
07
H P
18
H Q
19
H R
1a
H S
1b
H T
1c
H U
1d
H V
1e
H W
1f
H X
10
H Y
11
H Z
12
H !
69
i
H "
6a
j
H #
6b
k
H $
6c
l
H %
6d
m
H &
6e
n
H '
6f
o
H (
60
`
H )
61
a
H *
62
b
H +
63
c
H ,
64
d
H -
65
e
H .
66
f
H /
67
g
H :
72
r
H ;
73
s
H <
74
t
H =
75
u
H >
76
v
H ?
77
w
H @
08
H [
13
H \
14
H ]
15
H ^
16
H _
17
H `
28
(
H {
33
3
H |
34
4
H }
35
5
H ~
36
6

68
h

41
A

42
B

45
E
H &#11;
43
C
H &#12;
44
D
I 0
79
y
I 1
78
x
I 2
7b
{
I 3
7a
z
I 4
7d
}
I 5
7c
|
I 6
7f
I 7
7e
~
I 8
71
q
I 9
70
p
I a
28
(
I b
2b
+
I c
2a
*
I d
2d
-
I e
2c
,
I f
2f
/
I g
2e
.
I h
21
!
I i
20
I j
23
#
I k
22
"
I l
25
%
I m
24
$
I n
27
'
I o
26
&
I p
39
9
I q
38
8
I r
3b
;
I s
3a
:
I t
3d
=
I u
3c
<
I v
3f
?
I w
3e
>
I x
31
1
I y
30
0
I z
33
3
I A
08
I B
0b
&#11;
I C
0a
I D
0d
I E
0c
&#12;
I F
0f
I G
0e
I H
01
I I
00
I J
03
I K
02
I L
05
I M
04
I N
07
I O
06
I P
19
I Q
18
I R
1b
I S
1a
I T
1d
I U
1c
I V
1f
I W
1e
I X
11
I Y
10
I Z
13
I !
68
h
I "
6b
k
I #
6a
j
I $
6d
m
I %
6c
l
I &
6f
o
I '
6e
n
I (
61
a
I )
60
`
I *
63
c
I +
62
b
I ,
65
e
I -
64
d
I .
67
g
I /
66
f
I :
73
s
I ;
72
r
I <
75
u
I =
74
t
I >
77
w
I ?
76
v
I @
09
I [
12
I \
15
I ]
14
I ^
17
I _
16
I `
29
)
I {
32
2
I |
35
5
I }
34
4
I ~
37
7

69
i

40
@

43
C

44
D
I &#11;
42
B
I &#12;
45
E
J 0
7a
z
J 1
7b
{
J 2
78
x
J 3
79
y
J 4
7e
~
J 5
7f
J 6
7c
|
J 7
7d
}
J 8
72
r
J 9
73
s
J a
2b
+
J b
28
(
J c
29
)
J d
2e
.
J e
2f
/
J f
2c
,
J g
2d
-
J h
22
"
J i
23
#
J j
20
J k
21
!
J l
26
&
J m
27
'
J n
24
$
J o
25
%
J p
3a
:
J q
3b
;
J r
38
8
J s
39
9
J t
3e
>
J u
3f
?
J v
3c
<
J w
3d
=
J x
32
2
J y
33
3
J z
30
0
J A
0b
&#11;
J B
08
J C
09
J D
0e
J E
0f
J F
0c
&#12;
J G
0d
J H
02
J I
03
J J
00
J K
01
J L
06
J M
07
J N
04
J O
05
J P
1a
J Q
1b
J R
18
J S
19
J T
1e
J U
1f
J V
1c
J W
1d
J X
12
J Y
13
J Z
10
J !
6b
k
J "
68
h
J #
69
i
J $
6e
n
J %
6f
o
J &
6c
l
J '
6d
m
J (
62
b
J )
63
c
J *
60
`
J +
61
a
J ,
66
f
J -
67
g
J .
64
d
J /
65
e
J :
70
p
J ;
71
q
J <
76
v
J =
77
w
J >
74
t
J ?
75
u
J @
0a
J [
11
J \
16
J ]
17
J ^
14
J _
15
J `
2a
*
J {
31
1
J |
36
6
J }
37
7
J ~
34
4

6a
j

43
C

40
@

47
G
J &#11;
41
A
J &#12;
46
F
K 0
7b
{
K 1
7a
z
K 2
79
y
K 3
78
x
K 4
7f
K 5
7e
~
K 6
7d
}
K 7
7c
|
K 8
73
s
K 9
72
r
K a
2a
*
K b
29
)
K c
28
(
K d
2f
/
K e
2e
.
K f
2d
-
K g
2c
,
K h
23
#
K i
22
"
K j
21
!
K k
20
K l
27
'
K m
26
&
K n
25
%
K o
24
$
K p
3b
;
K q
3a
:
K r
39
9
K s
38
8
K t
3f
?
K u
3e
>
K v
3d
=
K w
3c
<
K x
33
3
K y
32
2
K z
31
1
K A
0a
K B
09
K C
08
K D
0f
K E
0e
K F
0d
K G
0c
&#12;
K H
03
K I
02
K J
01
K K
00
K L
07
K M
06
K N
05
K O
04
K P
1b
K Q
1a
K R
19
K S
18
K T
1f
K U
1e
K V
1d
K W
1c
K X
13
K Y
12
K Z
11
K !
6a
j
K "
69
i
K #
68
h
K $
6f
o
K %
6e
n
K &
6d
m
K '
6c
l
K (
63
c
K )
62
b
K *
61
a
K +
60
`
K ,
67
g
K -
66
f
K .
65
e
K /
64
d
K :
71
q
K ;
70
p
K <
77
w
K =
76
v
K >
75
u
K ?
74
t
K @
0b
&#11;
K [
10
K \
17
K ]
16
K ^
15
K _
14
K `
2b
+
K {
30
0
K |
37
7
K }
36
6
K ~
35
5

6b
k

42
B

41
A

46
F
K &#11;
40
@
K &#12;
47
G
L 0
7c
|
L 1
7d
}
L 2
7e
~
L 3
7f
L 4
78
x
L 5
79
y
L 6
7a
z
L 7
7b
{
L 8
74
t
L 9
75
u
L a
2d
-
L b
2e
.
L c
2f
/
L d
28
(
L e
29
)
L f
2a
*
L g
2b
+
L h
24
$
L i
25
%
L j
26
&
L k
27
'
L l
20
L m
21
!
L n
22
"
L o
23
#
L p
3c
<
L q
3d
=
L r
3e
>
L s
3f
?
L t
38
8
L u
39
9
L v
3a
:
L w
3b
;
L x
34
4
L y
35
5
L z
36
6
L A
0d
L B
0e
L C
0f
L D
08
L E
09
L F
0a
L G
0b
&#11;
L H
04
L I
05
L J
06
L K
07
L L
00
L M
01
L N
02
L O
03
L P
1c
L Q
1d
L R
1e
L S
1f
L T
18
L U
19
L V
1a
L W
1b
L X
14
L Y
15
L Z
16
L !
6d
m
L "
6e
n
L #
6f
o
L $
68
h
L %
69
i
L &
6a
j
L '
6b
k
L (
64
d
L )
65
e
L *
66
f
L +
67
g
L ,
60
`
L -
61
a
L .
62
b
L /
63
c
L :
76
v
L ;
77
w
L <
70
p
L =
71
q
L >
72
r
L ?
73
s
L @
0c
&#12;
L [
17
L \
10
L ]
11
L ^
12
L _
13
L `
2c
,
L {
37
7
L |
30
0
L }
31
1
L ~
32
2

6c
l

45
E

46
F

41
A
L &#11;
47
G
L &#12;
40
@
M 0
7d
}
M 1
7c
|
M 2
7f
M 3
7e
~
M 4
79
y
M 5
78
x
M 6
7b
{
M 7
7a
z
M 8
75
u
M 9
74
t
M a
2c
,
M b
2f
/
M c
2e
.
M d
29
)
M e
28
(
M f
2b
+
M g
2a
*
M h
25
%
M i
24
$
M j
27
'
M k
26
&
M l
21
!
M m
20
M n
23
#
M o
22
"
M p
3d
=
M q
3c
<
M r
3f
?
M s
3e
>
M t
39
9
M u
38
8
M v
3b
;
M w
3a
:
M x
35
5
M y
34
4
M z
37
7
M A
0c
&#12;
M B
0f
M C
0e
M D
09
M E
08
M F
0b
&#11;
M G
0a
M H
05
M I
04
M J
07
M K
06
M L
01
M M
00
M N
03
M O
02
M P
1d
M Q
1c
M R
1f
M S
1e
M T
19
M U
18
M V
1b
M W
1a
M X
15
M Y
14
M Z
17
M !
6c
l
M "
6f
o
M #
6e
n
M $
69
i
M %
68
h
M &
6b
k
M '
6a
j
M (
65
e
M )
64
d
M *
67
g
M +
66
f
M ,
61
a
M -
60
`
M .
63
c
M /
62
b
M :
77
w
M ;
76
v
M <
71
q
M =
70
p
M >
73
s
M ?
72
r
M @
0d
M [
16
M \
11
M ]
10
M ^
13
M _
12
M `
2d
-
M {
36
6
M |
31
1
M }
30
0
M ~
33
3

6d
m

44
D

47
G

40
@
M &#11;
46
F
M &#12;
41
A
N 0
7e
~
N 1
7f
N 2
7c
|
N 3
7d
}
N 4
7a
z
N 5
7b
{
N 6
78
x
N 7
79
y
N 8
76
v
N 9
77
w
N a
2f
/
N b
2c
,
N c
2d
-
N d
2a
*
N e
2b
+
N f
28
(
N g
29
)
N h
26
&
N i
27
'
N j
24
$
N k
25
%
N l
22
"
N m
23
#
N n
20
N o
21
!
N p
3e
>
N q
3f
?
N r
3c
<
N s
3d
=
N t
3a
:
N u
3b
;
N v
38
8
N w
39
9
N x
36
6
N y
37
7
N z
34
4
N A
0f
N B
0c
&#12;
N C
0d
N D
0a
N E
0b
&#11;
N F
08
N G
09
N H
06
N I
07
N J
04
N K
05
N L
02
N M
03
N N
00
N O
01
N P
1e
N Q
1f
N R
1c
N S
1d
N T
1a
N U
1b
N V
18
N W
19
N X
16
N Y
17
N Z
14
N !
6f
o
N "
6c
l
N #
6d
m
N $
6a
j
N %
6b
k
N &
68
h
N '
69
i
N (
66
f
N )
67
g
N *
64
d
N +
65
e
N ,
62
b
N -
63
c
N .
60
`
N /
61
a
N :
74
t
N ;
75
u
N <
72
r
N =
73
s
N >
70
p
N ?
71
q
N @
0e
N [
15
N \
12
N ]
13
N ^
10
N _
11
N `
2e
.
N {
35
5
N |
32
2
N }
33
3
N ~
30
0

6e
n

47
G

44
D

43
C
N &#11;
45
E
N &#12;
42
B
O 0
7f
O 1
7e
~
O 2
7d
}
O 3
7c
|
O 4
7b
{
O 5
7a
z
O 6
79
y
O 7
78
x
O 8
77
w
O 9
76
v
O a
2e
.
O b
2d
-
O c
2c
,
O d
2b
+
O e
2a
*
O f
29
)
O g
28
(
O h
27
'
O i
26
&
O j
25
%
O k
24
$
O l
23
#
O m
22
"
O n
21
!
O o
20
O p
3f
?
O q
3e
>
O r
3d
=
O s
3c
<
O t
3b
;
O u
3a
:
O v
39
9
O w
38
8
O x
37
7
O y
36
6
O z
35
5
O A
0e
O B
0d
O C
0c
&#12;
O D
0b
&#11;
O E
0a
O F
09
O G
08
O H
07
O I
06
O J
05
O K
04
O L
03
O M
02
O N
01
O O
00
O P
1f
O Q
1e
O R
1d
O S
1c
O T
1b
O U
1a
O V
19
O W
18
O X
17
O Y
16
O Z
15
O !
6e
n
O "
6d
m
O #
6c
l
O $
6b
k
O %
6a
j
O &
69
i
O '
68
h
O (
67
g
O )
66
f
O *
65
e
O +
64
d
O ,
63
c
O -
62
b
O .
61
a
O /
60
`
O :
75
u
O ;
74
t
O <
73
s
O =
72
r
O >
71
q
O ?
70
p
O @
0f
O [
14
O \
13
O ]
12
O ^
11
O _
10
O `
2f
/
O {
34
4
O |
33
3
O }
32
2
O ~
31
1

6f
o

46
F

45
E

42
B
O &#11;
44
D
O &#12;
43
C
P 0
60
`
P 1
61
a
P 2
62
b
P 3
63
c
P 4
64
d
P 5
65
e
P 6
66
f
P 7
67
g
P 8
68
h
P 9
69
i
P a
31
1
P b
32
2
P c
33
3
P d
34
4
P e
35
5
P f
36
6
P g
37
7
P h
38
8
P i
39
9
P j
3a
:
P k
3b
;
P l
3c
<
P m
3d
=
P n
3e
>
P o
3f
?
P p
20
P q
21
!
P r
22
"
P s
23
#
P t
24
$
P u
25
%
P v
26
&
P w
27
'
P x
28
(
P y
29
)
P z
2a
*
P A
11
P B
12
P C
13
P D
14
P E
15
P F
16
P G
17
P H
18
P I
19
P J
1a
P K
1b
P L
1c
P M
1d
P N
1e
P O
1f
P P
00
P Q
01
P R
02
P S
03
P T
04
P U
05
P V
06
P W
07
P X
08
P Y
09
P Z
0a
P !
71
q
P "
72
r
P #
73
s
P $
74
t
P %
75
u
P &
76
v
P '
77
w
P (
78
x
P )
79
y
P *
7a
z
P +
7b
{
P ,
7c
|
P -
7d
}
P .
7e
~
P /
7f
P :
6a
j
P ;
6b
k
P <
6c
l
P =
6d
m
P >
6e
n
P ?
6f
o
P @
10
P [
0b
&#11;
P \
0c
&#12;
P ]
0d
P ^
0e
P _
0f
P `
30
0
P {
2b
+
P |
2c
,
P }
2d
-
P ~
2e
.

70
p

59
Y

5a
Z

5d
]
P &#11;
5b
[
P &#12;
5c
\
Q 0
61
a
Q 1
60
`
Q 2
63
c
Q 3
62
b
Q 4
65
e
Q 5
64
d
Q 6
67
g
Q 7
66
f
Q 8
69
i
Q 9
68
h
Q a
30
0
Q b
33
3
Q c
32
2
Q d
35
5
Q e
34
4
Q f
37
7
Q g
36
6
Q h
39
9
Q i
38
8
Q j
3b
;
Q k
3a
:
Q l
3d
=
Q m
3c
<
Q n
3f
?
Q o
3e
>
Q p
21
!
Q q
20
Q r
23
#
Q s
22
"
Q t
25
%
Q u
24
$
Q v
27
'
Q w
26
&
Q x
29
)
Q y
28
(
Q z
2b
+
Q A
10
Q B
13
Q C
12
Q D
15
Q E
14
Q F
17
Q G
16
Q H
19
Q I
18
Q J
1b
Q K
1a
Q L
1d
Q M
1c
Q N
1f
Q O
1e
Q P
01
Q Q
00
Q R
03
Q S
02
Q T
05
Q U
04
Q V
07
Q W
06
Q X
09
Q Y
08
Q Z
0b
&#11;
Q !
70
p
Q "
73
s
Q #
72
r
Q $
75
u
Q %
74
t
Q &
77
w
Q '
76
v
Q (
79
y
Q )
78
x
Q *
7b
{
Q +
7a
z
Q ,
7d
}
Q -
7c
|
Q .
7f
Q /
7e
~
Q :
6b
k
Q ;
6a
j
Q <
6d
m
Q =
6c
l
Q >
6f
o
Q ?
6e
n
Q @
11
Q [
0a
Q \
0d
Q ]
0c
&#12;
Q ^
0f
Q _
0e
Q `
31
1
Q {
2a
*
Q |
2d
-
Q }
2c
,
Q ~
2f
/

71
q

58
X

5b
[

5c
\
Q &#11;
5a
Z
Q &#12;
5d
]
R 0
62
b
R 1
63
c
R 2
60
`
R 3
61
a
R 4
66
f
R 5
67
g
R 6
64
d
R 7
65
e
R 8
6a
j
R 9
6b
k
R a
33
3
R b
30
0
R c
31
1
R d
36
6
R e
37
7
R f
34
4
R g
35
5
R h
3a
:
R i
3b
;
R j
38
8
R k
39
9
R l
3e
>
R m
3f
?
R n
3c
<
R o
3d
=
R p
22
"
R q
23
#
R r
20
R s
21
!
R t
26
&
R u
27
'
R v
24
$
R w
25
%
R x
2a
*
R y
2b
+
R z
28
(
R A
13
R B
10
R C
11
R D
16
R E
17
R F
14
R G
15
R H
1a
R I
1b
R J
18
R K
19
R L
1e
R M
1f
R N
1c
R O
1d
R P
02
R Q
03
R R
00
R S
01
R T
06
R U
07
R V
04
R W
05
R X
0a
R Y
0b
&#11;
R Z
08
R !
73
s
R "
70
p
R #
71
q
R $
76
v
R %
77
w
R &
74
t
R '
75
u
R (
7a
z
R )
7b
{
R *
78
x
R +
79
y
R ,
7e
~
R -
7f
R .
7c
|
R /
7d
}
R :
68
h
R ;
69
i
R <
6e
n
R =
6f
o
R >
6c
l
R ?
6d
m
R @
12
R [
09
R \
0e
R ]
0f
R ^
0c
&#12;
R _
0d
R `
32
2
R {
29
)
R |
2e
.
R }
2f
/
R ~
2c
,

72
r

5b
[

58
X

5f
_
R &#11;
59
Y
R &#12;
5e
^
S 0
63
c
S 1
62
b
S 2
61
a
S 3
60
`
S 4
67
g
S 5
66
f
S 6
65
e
S 7
64
d
S 8
6b
k
S 9
6a
j
S a
32
2
S b
31
1
S c
30
0
S d
37
7
S e
36
6
S f
35
5
S g
34
4
S h
3b
;
S i
3a
:
S j
39
9
S k
38
8
S l
3f
?
S m
3e
>
S n
3d
=
S o
3c
<
S p
23
#
S q
22
"
S r
21
!
S s
20
S t
27
'
S u
26
&
S v
25
%
S w
24
$
S x
2b
+
S y
2a
*
S z
29
)
S A
12
S B
11
S C
10
S D
17
S E
16
S F
15
S G
14
S H
1b
S I
1a
S J
19
S K
18
S L
1f
S M
1e
S N
1d
S O
1c
S P
03
S Q
02
S R
01
S S
00
S T
07
S U
06
S V
05
S W
04
S X
0b
&#11;
S Y
0a
S Z
09
S !
72
r
S "
71
q
S #
70
p
S $
77
w
S %
76
v
S &
75
u
S '
74
t
S (
7b
{
S )
7a
z
S *
79
y
S +
78
x
S ,
7f
S -
7e
~
S .
7d
}
S /
7c
|
S :
69
i
S ;
68
h
S <
6f
o
S =
6e
n
S >
6d
m
S ?
6c
l
S @
13
S [
08
S \
0f
S ]
0e
S ^
0d
S _
0c
&#12;
S `
33
3
S {
28
(
S |
2f
/
S }
2e
.
S ~
2d
-

73
s

5a
Z

59
Y

5e
^
S &#11;
58
X
S &#12;
5f
_
T 0
64
d
T 1
65
e
T 2
66
f
T 3
67
g
T 4
60
`
T 5
61
a
T 6
62
b
T 7
63
c
T 8
6c
l
T 9
6d
m
T a
35
5
T b
36
6
T c
37
7
T d
30
0
T e
31
1
T f
32
2
T g
33
3
T h
3c
<
T i
3d
=
T j
3e
>
T k
3f
?
T l
38
8
T m
39
9
T n
3a
:
T o
3b
;
T p
24
$
T q
25
%
T r
26
&
T s
27
'
T t
20
T u
21
!
T v
22
"
T w
23
#
T x
2c
,
T y
2d
-
T z
2e
.
T A
15
T B
16
T C
17
T D
10
T E
11
T F
12
T G
13
T H
1c
T I
1d
T J
1e
T K
1f
T L
18
T M
19
T N
1a
T O
1b
T P
04
T Q
05
T R
06
T S
07
T T
00
T U
01
T V
02
T W
03
T X
0c
&#12;
T Y
0d
T Z
0e
T !
75
u
T "
76
v
T #
77
w
T $
70
p
T %
71
q
T &
72
r
T '
73
s
T (
7c
|
T )
7d
}
T *
7e
~
T +
7f
T ,
78
x
T -
79
y
T .
7a
z
T /
7b
{
T :
6e
n
T ;
6f
o
T <
68
h
T =
69
i
T >
6a
j
T ?
6b
k
T @
14
T [
0f
T \
08
T ]
09
T ^
0a
T _
0b
&#11;
T `
34
4
T {
2f
/
T |
28
(
T }
29
)
T ~
2a
*

74
t

5d
]

5e
^

59
Y
T &#11;
5f
_
T &#12;
58
X
U 0
65
e
U 1
64
d
U 2
67
g
U 3
66
f
U 4
61
a
U 5
60
`
U 6
63
c
U 7
62
b
U 8
6d
m
U 9
6c
l
U a
34
4
U b
37
7
U c
36
6
U d
31
1
U e
30
0
U f
33
3
U g
32
2
U h
3d
=
U i
3c
<
U j
3f
?
U k
3e
>
U l
39
9
U m
38
8
U n
3b
;
U o
3a
:
U p
25
%
U q
24
$
U r
27
'
U s
26
&
U t
21
!
U u
20
U v
23
#
U w
22
"
U x
2d
-
U y
2c
,
U z
2f
/
U A
14
U B
17
U C
16
U D
11
U E
10
U F
13
U G
12
U H
1d
U I
1c
U J
1f
U K
1e
U L
19
U M
18
U N
1b
U O
1a
U P
05
U Q
04
U R
07
U S
06
U T
01
U U
00
U V
03
U W
02
U X
0d
U Y
0c
&#12;
U Z
0f
U !
74
t
U "
77
w
U #
76
v
U $
71
q
U %
70
p
U &
73
s
U '
72
r
U (
7d
}
U )
7c
|
U *
7f
U +
7e
~
U ,
79
y
U -
78
x
U .
7b
{
U /
7a
z
U :
6f
o
U ;
6e
n
U <
69
i
U =
68
h
U >
6b
k
U ?
6a
j
U @
15
U [
0e
U \
09
U ]
08
U ^
0b
&#11;
U _
0a
U `
35
5
U {
2e
.
U |
29
)
U }
28
(
U ~
2b
+

75
u

5c
\

5f
_

58
X
U &#11;
5e
^
U &#12;
59
Y
V 0
66
f
V 1
67
g
V 2
64
d
V 3
65
e
V 4
62
b
V 5
63
c
V 6
60
`
V 7
61
a
V 8
6e
n
V 9
6f
o
V a
37
7
V b
34
4
V c
35
5
V d
32
2
V e
33
3
V f
30
0
V g
31
1
V h
3e
>
V i
3f
?
V j
3c
<
V k
3d
=
V l
3a
:
V m
3b
;
V n
38
8
V o
39
9
V p
26
&
V q
27
'
V r
24
$
V s
25
%
V t
22
"
V u
23
#
V v
20
V w
21
!
V x
2e
.
V y
2f
/
V z
2c
,
V A
17
V B
14
V C
15
V D
12
V E
13
V F
10
V G
11
V H
1e
V I
1f
V J
1c
V K
1d
V L
1a
V M
1b
V N
18
V O
19
V P
06
V Q
07
V R
04
V S
05
V T
02
V U
03
V V
00
V W
01
V X
0e
V Y
0f
V Z
0c
&#12;
V !
77
w
V "
74
t
V #
75
u
V $
72
r
V %
73
s
V &
70
p
V '
71
q
V (
7e
~
V )
7f
V *
7c
|
V +
7d
}
V ,
7a
z
V -
7b
{
V .
78
x
V /
79
y
V :
6c
l
V ;
6d
m
V <
6a
j
V =
6b
k
V >
68
h
V ?
69
i
V @
16
V [
0d
V \
0a
V ]
0b
&#11;
V ^
08
V _
09
V `
36
6
V {
2d
-
V |
2a
*
V }
2b
+
V ~
28
(

76
v

5f
_

5c
\

5b
[
V &#11;
5d
]
V &#12;
5a
Z
W 0
67
g
W 1
66
f
W 2
65
e
W 3
64
d
W 4
63
c
W 5
62
b
W 6
61
a
W 7
60
`
W 8
6f
o
W 9
6e
n
W a
36
6
W b
35
5
W c
34
4
W d
33
3
W e
32
2
W f
31
1
W g
30
0
W h
3f
?
W i
3e
>
W j
3d
=
W k
3c
<
W l
3b
;
W m
3a
:
W n
39
9
W o
38
8
W p
27
'
W q
26
&
W r
25
%
W s
24
$
W t
23
#
W u
22
"
W v
21
!
W w
20
W x
2f
/
W y
2e
.
W z
2d
-
W A
16
W B
15
W C
14
W D
13
W E
12
W F
11
W G
10
W H
1f
W I
1e
W J
1d
W K
1c
W L
1b
W M
1a
W N
19
W O
18
W P
07
W Q
06
W R
05
W S
04
W T
03
W U
02
W V
01
W W
00
W X
0f
W Y
0e
W Z
0d
W !
76
v
W "
75
u
W #
74
t
W $
73
s
W %
72
r
W &
71
q
W '
70
p
W (
7f
W )
7e
~
W *
7d
}
W +
7c
|
W ,
7b
{
W -
7a
z
W .
79
y
W /
78
x
W :
6d
m
W ;
6c
l
W <
6b
k
W =
6a
j
W >
69
i
W ?
68
h
W @
17
W [
0c
&#12;
W \
0b
&#11;
W ]
0a
W ^
09
W _
08
W `
37
7
W {
2c
,
W |
2b
+
W }
2a
*
W ~
29
)

77
w

5e
^

5d
]

5a
Z
W &#11;
5c
\
W &#12;
5b
[
X 0
68
h
X 1
69
i
X 2
6a
j
X 3
6b
k
X 4
6c
l
X 5
6d
m
X 6
6e
n
X 7
6f
o
X 8
60
`
X 9
61
a
X a
39
9
X b
3a
:
X c
3b
;
X d
3c
<
X e
3d
=
X f
3e
>
X g
3f
?
X h
30
0
X i
31
1
X j
32
2
X k
33
3
X l
34
4
X m
35
5
X n
36
6
X o
37
7
X p
28
(
X q
29
)
X r
2a
*
X s
2b
+
X t
2c
,
X u
2d
-
X v
2e
.
X w
2f
/
X x
20
X y
21
!
X z
22
"
X A
19
X B
1a
X C
1b
X D
1c
X E
1d
X F
1e
X G
1f
X H
10
X I
11
X J
12
X K
13
X L
14
X M
15
X N
16
X O
17
X P
08
X Q
09
X R
0a
X S
0b
&#11;
X T
0c
&#12;
X U
0d
X V
0e
X W
0f
X X
00
X Y
01
X Z
02
X !
79
y
X "
7a
z
X #
7b
{
X $
7c
|
X %
7d
}
X &
7e
~
X '
7f
X (
70
p
X )
71
q
X *
72
r
X +
73
s
X ,
74
t
X -
75
u
X .
76
v
X /
77
w
X :
62
b
X ;
63
c
X <
64
d
X =
65
e
X >
66
f
X ?
67
g
X @
18
X [
03
X \
04
X ]
05
X ^
06
X _
07
X `
38
8
X {
23
#
X |
24
$
X }
25
%
X ~
26
&

78
x

51
Q

52
R

55
U
X &#11;
53
S
X &#12;
54
T
Y 0
69
i
Y 1
68
h
Y 2
6b
k
Y 3
6a
j
Y 4
6d
m
Y 5
6c
l
Y 6
6f
o
Y 7
6e
n
Y 8
61
a
Y 9
60
`
Y a
38
8
Y b
3b
;
Y c
3a
:
Y d
3d
=
Y e
3c
<
Y f
3f
?
Y g
3e
>
Y h
31
1
Y i
30
0
Y j
33
3
Y k
32
2
Y l
35
5
Y m
34
4
Y n
37
7
Y o
36
6
Y p
29
)
Y q
28
(
Y r
2b
+
Y s
2a
*
Y t
2d
-
Y u
2c
,
Y v
2f
/
Y w
2e
.
Y x
21
!
Y y
20
Y z
23
#
Y A
18
Y B
1b
Y C
1a
Y D
1d
Y E
1c
Y F
1f
Y G
1e
Y H
11
Y I
10
Y J
13
Y K
12
Y L
15
Y M
14
Y N
17
Y O
16
Y P
09
Y Q
08
Y R
0b
&#11;
Y S
0a
Y T
0d
Y U
0c
&#12;
Y V
0f
Y W
0e
Y X
01
Y Y
00
Y Z
03
Y !
78
x
Y "
7b
{
Y #
7a
z
Y $
7d
}
Y %
7c
|
Y &
7f
Y '
7e
~
Y (
71
q
Y )
70
p
Y *
73
s
Y +
72
r
Y ,
75
u
Y -
74
t
Y .
77
w
Y /
76
v
Y :
63
c
Y ;
62
b
Y <
65
e
Y =
64
d
Y >
67
g
Y ?
66
f
Y @
19
Y [
02
Y \
05
Y ]
04
Y ^
07
Y _
06
Y `
39
9
Y {
22
"
Y |
25
%
Y }
24
$
Y ~
27
'

79
y

50
P

53
S

54
T
Y &#11;
52
R
Y &#12;
55
U
Z 0
6a
j
Z 1
6b
k
Z 2
68
h
Z 3
69
i
Z 4
6e
n
Z 5
6f
o
Z 6
6c
l
Z 7
6d
m
Z 8
62
b
Z 9
63
c
Z a
3b
;
Z b
38
8
Z c
39
9
Z d
3e
>
Z e
3f
?
Z f
3c
<
Z g
3d
=
Z h
32
2
Z i
33
3
Z j
30
0
Z k
31
1
Z l
36
6
Z m
37
7
Z n
34
4
Z o
35
5
Z p
2a
*
Z q
2b
+
Z r
28
(
Z s
29
)
Z t
2e
.
Z u
2f
/
Z v
2c
,
Z w
2d
-
Z x
22
"
Z y
23
#
Z z
20
Z A
1b
Z B
18
Z C
19
Z D
1e
Z E
1f
Z F
1c
Z G
1d
Z H
12
Z I
13
Z J
10
Z K
11
Z L
16
Z M
17
Z N
14
Z O
15
Z P
0a
Z Q
0b
&#11;
Z R
08
Z S
09
Z T
0e
Z U
0f
Z V
0c
&#12;
Z W
0d
Z X
02
Z Y
03
Z Z
00
Z !
7b
{
Z "
78
x
Z #
79
y
Z $
7e
~
Z %
7f
Z &
7c
|
Z '
7d
}
Z (
72
r
Z )
73
s
Z *
70
p
Z +
71
q
Z ,
76
v
Z -
77
w
Z .
74
t
Z /
75
u
Z :
60
`
Z ;
61
a
Z <
66
f
Z =
67
g
Z >
64
d
Z ?
65
e
Z @
1a
Z [
01
Z \
06
Z ]
07
Z ^
04
Z _
05
Z `
3a
:
Z {
21
!
Z |
26
&
Z }
27
'
Z ~
24
$

7a
z

53
S

50
P

57
W
Z &#11;
51
Q
Z &#12;
56
V
! 0
11
! 1
10
! 2
13
! 3
12
! 4
15
! 5
14
! 6
17
! 7
16
! 8
19
! 9
18
! a
40
@
! b
43
C
! c
42
B
! d
45
E
! e
44
D
! f
47
G
! g
46
F
! h
49
I
! i
48
H
! j
4b
K
! k
4a
J
! l
4d
M
! m
4c
L
! n
4f
O
! o
4e
N
! p
51
Q
! q
50
P
! r
53
S
! s
52
R
! t
55
U
! u
54
T
! v
57
W
! w
56
V
! x
59
Y
! y
58
X
! z
5b
[
! A
60
`
! B
63
c
! C
62
b
! D
65
e
! E
64
d
! F
67
g
! G
66
f
! H
69
i
! I
68
h
! J
6b
k
! K
6a
j
! L
6d
m
! M
6c
l
! N
6f
o
! O
6e
n
! P
71
q
! Q
70
p
! R
73
s
! S
72
r
! T
75
u
! U
74
t
! V
77
w
! W
76
v
! X
79
y
! Y
78
x
! Z
7b
{
! !
00
! "
03
! #
02
! $
05
! %
04
! &
07
! '
06
! (
09
! )
08
! *
0b
&#11;
! +
0a
! ,
0d
! -
0c
&#12;
! .
0f
! /
0e
! :
1b
! ;
1a
! <
1d
! =
1c
! >
1f
! ?
1e
! @
61
a
! [
7a
z
! \
7d
}
! ]
7c
|
! ^
7f
! _
7e
~
! `
41
A
! {
5a
Z
! |
5d
]
! }
5c
\
! ~
5f
_

01

28
(

2b
+

2c
,
! &#11;
2a
*
! &#12;
2d
-
" 0
12
" 1
13
" 2
10
" 3
11
" 4
16
" 5
17
" 6
14
" 7
15
" 8
1a
" 9
1b
" a
43
C
" b
40
@
" c
41
A
" d
46
F
" e
47
G
" f
44
D
" g
45
E
" h
4a
J
" i
4b
K
" j
48
H
" k
49
I
" l
4e
N
" m
4f
O
" n
4c
L
" o
4d
M
" p
52
R
" q
53
S
" r
50
P
" s
51
Q
" t
56
V
" u
57
W
" v
54
T
" w
55
U
" x
5a
Z
" y
5b
[
" z
58
X
" A
63
c
" B
60
`
" C
61
a
" D
66
f
" E
67
g
" F
64
d
" G
65
e
" H
6a
j
" I
6b
k
" J
68
h
" K
69
i
" L
6e
n
" M
6f
o
" N
6c
l
" O
6d
m
" P
72
r
" Q
73
s
" R
70
p
" S
71
q
" T
76
v
" U
77
w
" V
74
t
" W
75
u
" X
7a
z
" Y
7b
{
" Z
78
x
" !
03
" "
00
" #
01
" $
06
" %
07
" &
04
" '
05
" (
0a
" )
0b
&#11;
" *
08
" +
09
" ,
0e
" -
0f
" .
0c
&#12;
" /
0d
" :
18
" ;
19
" <
1e
" =
1f
" >
1c
" ?
1d
" @
62
b
" [
79
y
" \
7e
~
" ]
7f
" ^
7c
|
" _
7d
}
" `
42
B
" {
59
Y
" |
5e
^
" }
5f
_
" ~
5c
\

02

2b
+

28
(

2f
/
" &#11;
29
)
" &#12;
2e
.
# 0
13
# 1
12
# 2
11
# 3
10
# 4
17
# 5
16
# 6
15
# 7
14
# 8
1b
# 9
1a
# a
42
B
# b
41
A
# c
40
@
# d
47
G
# e
46
F
# f
45
E
# g
44
D
# h
4b
K
# i
4a
J
# j
49
I
# k
48
H
# l
4f
O
# m
4e
N
# n
4d
M
# o
4c
L
# p
53
S
# q
52
R
# r
51
Q
# s
50
P
# t
57
W
# u
56
V
# v
55
U
# w
54
T
# x
5b
[
# y
5a
Z
# z
59
Y
# A
62
b
# B
61
a
# C
60
`
# D
67
g
# E
66
f
# F
65
e
# G
64
d
# H
6b
k
# I
6a
j
# J
69
i
# K
68
h
# L
6f
o
# M
6e
n
# N
6d
m
# O
6c
l
# P
73
s
# Q
72
r
# R
71
q
# S
70
p
# T
77
w
# U
76
v
# V
75
u
# W
74
t
# X
7b
{
# Y
7a
z
# Z
79
y
# !
02
# "
01
# #
00
# $
07
# %
06
# &
05
# '
04
# (
0b
&#11;
# )
0a
# *
09
# +
08
# ,
0f
# -
0e
# .
0d
# /
0c
&#12;
# :
19
# ;
18
# <
1f
# =
1e
# >
1d
# ?
1c
# @
63
c
# [
78
x
# \
7f
# ]
7e
~
# ^
7d
}
# _
7c
|
# `
43
C
# {
58
X
# |
5f
_
# }
5e
^
# ~
5d
]

03

2a
*

29
)

2e
.
# &#11;
28
(
# &#12;
2f
/
$ 0
14
$ 1
15
$ 2
16
$ 3
17
$ 4
10
$ 5
11
$ 6
12
$ 7
13
$ 8
1c
$ 9
1d
$ a
45
E
$ b
46
F
$ c
47
G
$ d
40
@
$ e
41
A
$ f
42
B
$ g
43
C
$ h
4c
L
$ i
4d
M
$ j
4e
N
$ k
4f
O
$ l
48
H
$ m
49
I
$ n
4a
J
$ o
4b
K
$ p
54
T
$ q
55
U
$ r
56
V
$ s
57
W
$ t
50
P
$ u
51
Q
$ v
52
R
$ w
53
S
$ x
5c
\
$ y
5d
]
$ z
5e
^
$ A
65
e
$ B
66
f
$ C
67
g
$ D
60
`
$ E
61
a
$ F
62
b
$ G
63
c
$ H
6c
l
$ I
6d
m
$ J
6e
n
$ K
6f
o
$ L
68
h
$ M
69
i
$ N
6a
j
$ O
6b
k
$ P
74
t
$ Q
75
u
$ R
76
v
$ S
77
w
$ T
70
p
$ U
71
q
$ V
72
r
$ W
73
s
$ X
7c
|
$ Y
7d
}
$ Z
7e
~
$ !
05
$ "
06
$ #
07
$ $
00
$ %
01
$ &
02
$ '
03
$ (
0c
&#12;
$ )
0d
$ *
0e
$ +
0f
$ ,
08
$ -
09
$ .
0a
$ /
0b
&#11;
$ :
1e
$ ;
1f
$ <
18
$ =
19
$ >
1a
$ ?
1b
$ @
64
d
$ [
7f
$ \
78
x
$ ]
79
y
$ ^
7a
z
$ _
7b
{
$ `
44
D
$ {
5f
_
$ |
58
X
$ }
59
Y
$ ~
5a
Z

04

2d
-

2e
.

29
)
$ &#11;
2f
/
$ &#12;
28
(
% 0
15
% 1
14
% 2
17
% 3
16
% 4
11
% 5
10
% 6
13
% 7
12
% 8
1d
% 9
1c
% a
44
D
% b
47
G
% c
46
F
% d
41
A
% e
40
@
% f
43
C
% g
42
B
% h
4d
M
% i
4c
L
% j
4f
O
% k
4e
N
% l
49
I
% m
48
H
% n
4b
K
% o
4a
J
% p
55
U
% q
54
T
% r
57
W
% s
56
V
% t
51
Q
% u
50
P
% v
53
S
% w
52
R
% x
5d
]
% y
5c
\
% z
5f
_
% A
64
d
% B
67
g
% C
66
f
% D
61
a
% E
60
`
% F
63
c
% G
62
b
% H
6d
m
% I
6c
l
% J
6f
o
% K
6e
n
% L
69
i
% M
68
h
% N
6b
k
% O
6a
j
% P
75
u
% Q
74
t
% R
77
w
% S
76
v
% T
71
q
% U
70
p
% V
73
s
% W
72
r
% X
7d
}
% Y
7c
|
% Z
7f
% !
04
% "
07
% #
06
% $
01
% %
00
% &
03
% '
02
% (
0d
% )
0c
&#12;
% *
0f
% +
0e
% ,
09
% -
08
% .
0b
&#11;
% /
0a
% :
1f
% ;
1e
% <
19
% =
18
% >
1b
% ?
1a
% @
65
e
% [
7e
~
% \
79
y
% ]
78
x
% ^
7b
{
% _
7a
z
% `
45
E
% {
5e
^
% |
59
Y
% }
58
X
% ~
5b
[

05

2c
,

2f
/

28
(
% &#11;
2e
.
% &#12;
29
)
& 0
16
& 1
17
& 2
14
& 3
15
& 4
12
& 5
13
& 6
10
& 7
11
& 8
1e
& 9
1f
& a
47
G
& b
44
D
& c
45
E
& d
42
B
& e
43
C
& f
40
@
& g
41
A
& h
4e
N
& i
4f
O
& j
4c
L
& k
4d
M
& l
4a
J
& m
4b
K
& n
48
H
& o
49
I
& p
56
V
& q
57
W
& r
54
T
& s
55
U
& t
52
R
& u
53
S
& v
50
P
& w
51
Q
& x
5e
^
& y
5f
_
& z
5c
\
& A
67
g
& B
64
d
& C
65
e
& D
62
b
& E
63
c
& F
60
`
& G
61
a
& H
6e
n
& I
6f
o
& J
6c
l
& K
6d
m
& L
6a
j
& M
6b
k
& N
68
h
& O
69
i
& P
76
v
& Q
77
w
& R
74
t
& S
75
u
& T
72
r
& U
73
s
& V
70
p
& W
71
q
& X
7e
~
& Y
7f
& Z
7c
|
& !
07
& "
04
& #
05
& $
02
& %
03
& &
00
& '
01
& (
0e
& )
0f
& *
0c
&#12;
& +
0d
& ,
0a
& -
0b
&#11;
& .
08
& /
09
& :
1c
& ;
1d
& <
1a
& =
1b
& >
18
& ?
19
& @
66
f
& [
7d
}
& \
7a
z
& ]
7b
{
& ^
78
x
& _
79
y
& `
46
F
& {
5d
]
& |
5a
Z
& }
5b
[
& ~
58
X

06

2f
/

2c
,

2b
+
& &#11;
2d
-
& &#12;
2a
*
' 0
17
' 1
16
' 2
15
' 3
14
' 4
13
' 5
12
' 6
11
' 7
10
' 8
1f
' 9
1e
' a
46
F
' b
45
E
' c
44
D
' d
43
C
' e
42
B
' f
41
A
' g
40
@
' h
4f
O
' i
4e
N
' j
4d
M
' k
4c
L
' l
4b
K
' m
4a
J
' n
49
I
' o
48
H
' p
57
W
' q
56
V
' r
55
U
' s
54
T
' t
53
S
' u
52
R
' v
51
Q
' w
50
P
' x
5f
_
' y
5e
^
' z
5d
]
' A
66
f
' B
65
e
' C
64
d
' D
63
c
' E
62
b
' F
61
a
' G
60
`
' H
6f
o
' I
6e
n
' J
6d
m
' K
6c
l
' L
6b
k
' M
6a
j
' N
69
i
' O
68
h
' P
77
w
' Q
76
v
' R
75
u
' S
74
t
' T
73
s
' U
72
r
' V
71
q
' W
70
p
' X
7f
' Y
7e
~
' Z
7d
}
' !
06
' "
05
' #
04
' $
03
' %
02
' &
01
' '
00
' (
0f
' )
0e
' *
0d
' +
0c
&#12;
' ,
0b
&#11;
' -
0a
' .
09
' /
08
' :
1d
' ;
1c
' <
1b
' =
1a
' >
19
' ?
18
' @
67
g
' [
7c
|
' \
7b
{
' ]
7a
z
' ^
79
y
' _
78
x
' `
47
G
' {
5c
\
' |
5b
[
' }
5a
Z
' ~
59
Y

07

2e
.

2d
-

2a
*
' &#11;
2c
,
' &#12;
2b
+
( 0
18
( 1
19
( 2
1a
( 3
1b
( 4
1c
( 5
1d
( 6
1e
( 7
1f
( 8
10
( 9
11
( a
49
I
( b
4a
J
( c
4b
K
( d
4c
L
( e
4d
M
( f
4e
N
( g
4f
O
( h
40
@
( i
41
A
( j
42
B
( k
43
C
( l
44
D
( m
45
E
( n
46
F
( o
47
G
( p
58
X
( q
59
Y
( r
5a
Z
( s
5b
[
( t
5c
\
( u
5d
]
( v
5e
^
( w
5f
_
( x
50
P
( y
51
Q
( z
52
R
( A
69
i
( B
6a
j
( C
6b
k
( D
6c
l
( E
6d
m
( F
6e
n
( G
6f
o
( H
60
`
( I
61
a
( J
62
b
( K
63
c
( L
64
d
( M
65
e
( N
66
f
( O
67
g
( P
78
x
( Q
79
y
( R
7a
z
( S
7b
{
( T
7c
|
( U
7d
}
( V
7e
~
( W
7f
( X
70
p
( Y
71
q
( Z
72
r
( !
09
( "
0a
( #
0b
&#11;
( $
0c
&#12;
( %
0d
( &
0e
( '
0f
( (
00
( )
01
( *
02
( +
03
( ,
04
( -
05
( .
06
( /
07
( :
12
( ;
13
( <
14
( =
15
( >
16
( ?
17
( @
68
h
( [
73
s
( \
74
t
( ]
75
u
( ^
76
v
( _
77
w
( `
48
H
( {
53
S
( |
54
T
( }
55
U
( ~
56
V

08

21
!

22
"

25
%
( &#11;
23
#
( &#12;
24
$
) 0
19
) 1
18
) 2
1b
) 3
1a
) 4
1d
) 5
1c
) 6
1f
) 7
1e
) 8
11
) 9
10
) a
48
H
) b
4b
K
) c
4a
J
) d
4d
M
) e
4c
L
) f
4f
O
) g
4e
N
) h
41
A
) i
40
@
) j
43
C
) k
42
B
) l
45
E
) m
44
D
) n
47
G
) o
46
F
) p
59
Y
) q
58
X
) r
5b
[
) s
5a
Z
) t
5d
]
) u
5c
\
) v
5f
_
) w
5e
^
) x
51
Q
) y
50
P
) z
53
S
) A
68
h
) B
6b
k
) C
6a
j
) D
6d
m
) E
6c
l
) F
6f
o
) G
6e
n
) H
61
a
) I
60
`
) J
63
c
) K
62
b
) L
65
e
) M
64
d
) N
67
g
) O
66
f
) P
79
y
) Q
78
x
) R
7b
{
) S
7a
z
) T
7d
}
) U
7c
|
) V
7f
) W
7e
~
) X
71
q
) Y
70
p
) Z
73
s
) !
08
) "
0b
&#11;
) #
0a
) $
0d
) %
0c
&#12;
) &
0f
) '
0e
) (
01
) )
00
) *
03
) +
02
) ,
05
) -
04
) .
07
) /
06
) :
13
) ;
12
) <
15
) =
14
) >
17
) ?
16
) @
69
i
) [
72
r
) \
75
u
) ]
74
t
) ^
77
w
) _
76
v
) `
49
I
) {
52
R
) |
55
U
) }
54
T
) ~
57
W

09

20

23
#

24
$
) &#11;
22
"
) &#12;
25
%
* 0
1a
* 1
1b
* 2
18
* 3
19
* 4
1e
* 5
1f
* 6
1c
* 7
1d
* 8
12
* 9
13
* a
4b
K
* b
48
H
* c
49
I
* d
4e
N
* e
4f
O
* f
4c
L
* g
4d
M
* h
42
B
* i
43
C
* j
40
@
* k
41
A
* l
46
F
* m
47
G
* n
44
D
* o
45
E
* p
5a
Z
* q
5b
[
* r
58
X
* s
59
Y
* t
5e
^
* u
5f
_
* v
5c
\
* w
5d
]
* x
52
R
* y
53
S
* z
50
P
* A
6b
k
* B
68
h
* C
69
i
* D
6e
n
* E
6f
o
* F
6c
l
* G
6d
m
* H
62
b
* I
63
c
* J
60
`
* K
61
a
* L
66
f
* M
67
g
* N
64
d
* O
65
e
* P
7a
z
* Q
7b
{
* R
78
x
* S
79
y
* T
7e
~
* U
7f
* V
7c
|
* W
7d
}
* X
72
r
* Y
73
s
* Z
70
p
* !
0b
&#11;
* "
08
* #
09
* $
0e
* %
0f
* &
0c
&#12;
* '
0d
* (
02
* )
03
* *
00
* +
01
* ,
06
* -
07
* .
04
* /
05
* :
10
* ;
11
* <
16
* =
17
* >
14
* ?
15
* @
6a
j
* [
71
q
* \
76
v
* ]
77
w
* ^
74
t
* _
75
u
* `
4a
J
* {
51
Q
* |
56
V
* }
57
W
* ~
54
T

0a

23
#

20

27
'
* &#11;
21
!
* &#12;
26
&
+ 0
1b
+ 1
1a
+ 2
19
+ 3
18
+ 4
1f
+ 5
1e
+ 6
1d
+ 7
1c
+ 8
13
+ 9
12
+ a
4a
J
+ b
49
I
+ c
48
H
+ d
4f
O
+ e
4e
N
+ f
4d
M
+ g
4c
L
+ h
43
C
+ i
42
B
+ j
41
A
+ k
40
@
+ l
47
G
+ m
46
F
+ n
45
E
+ o
44
D
+ p
5b
[
+ q
5a
Z
+ r
59
Y
+ s
58
X
+ t
5f
_
+ u
5e
^
+ v
5d
]
+ w
5c
\
+ x
53
S
+ y
52
R
+ z
51
Q
+ A
6a
j
+ B
69
i
+ C
68
h
+ D
6f
o
+ E
6e
n
+ F
6d
m
+ G
6c
l
+ H
63
c
+ I
62
b
+ J
61
a
+ K
60
`
+ L
67
g
+ M
66
f
+ N
65
e
+ O
64
d
+ P
7b
{
+ Q
7a
z
+ R
79
y
+ S
78
x
+ T
7f
+ U
7e
~
+ V
7d
}
+ W
7c
|
+ X
73
s
+ Y
72
r
+ Z
71
q
+ !
0a
+ "
09
+ #
08
+ $
0f
+ %
0e
+ &
0d
+ '
0c
&#12;
+ (
03
+ )
02
+ *
01
+ +
00
+ ,
07
+ -
06
+ .
05
+ /
04
+ :
11
+ ;
10
+ <
17
+ =
16
+ >
15
+ ?
14
+ @
6b
k
+ [
70
p
+ \
77
w
+ ]
76
v
+ ^
75
u
+ _
74
t
+ `
4b
K
+ {
50
P
+ |
57
W
+ }
56
V
+ ~
55
U

0b
&#11;

22
"

21
!

26
&
+ &#11;
20
+ &#12;
27
'
, 0
1c
, 1
1d
, 2
1e
, 3
1f
, 4
18
, 5
19
, 6
1a
, 7
1b
, 8
14
, 9
15
, a
4d
M
, b
4e
N
, c
4f
O
, d
48
H
, e
49
I
, f
4a
J
, g
4b
K
, h
44
D
, i
45
E
, j
46
F
, k
47
G
, l
40
@
, m
41
A
, n
42
B
, o
43
C
, p
5c
\
, q
5d
]
, r
5e
^
, s
5f
_
, t
58
X
, u
59
Y
, v
5a
Z
, w
5b
[
, x
54
T
, y
55
U
, z
56
V
, A
6d
m
, B
6e
n
, C
6f
o
, D
68
h
, E
69
i
, F
6a
j
, G
6b
k
, H
64
d
, I
65
e
, J
66
f
, K
67
g
, L
60
`
, M
61
a
, N
62
b
, O
63
c
, P
7c
|
, Q
7d
}
, R
7e
~
, S
7f
, T
78
x
, U
79
y
, V
7a
z
, W
7b
{
, X
74
t
, Y
75
u
, Z
76
v
, !
0d
, "
0e
, #
0f
, $
08
, %
09
, &
0a
, '
0b
&#11;
, (
04
, )
05
, *
06
, +
07
, ,
00
, -
01
, .
02
, /
03
, :
16
, ;
17
, <
10
, =
11
, >
12
, ?
13
, @
6c
l
, [
77
w
, \
70
p
, ]
71
q
, ^
72
r
, _
73
s
, `
4c
L
, {
57
W
, |
50
P
, }
51
Q
, ~
52
R

0c
&#12;

25
%

26
&

21
!
, &#11;
27
'
, &#12;
20
- 0
1d
- 1
1c
- 2
1f
- 3
1e
- 4
19
- 5
18
- 6
1b
- 7
1a
- 8
15
- 9
14
- a
4c
L
- b
4f
O
- c
4e
N
- d
49
I
- e
48
H
- f
4b
K
- g
4a
J
- h
45
E
- i
44
D
- j
47
G
- k
46
F
- l
41
A
- m
40
@
- n
43
C
- o
42
B
- p
5d
]
- q
5c
\
- r
5f
_
- s
5e
^
- t
59
Y
- u
58
X
- v
5b
[
- w
5a
Z
- x
55
U
- y
54
T
- z
57
W
- A
6c
l
- B
6f
o
- C
6e
n
- D
69
i
- E
68
h
- F
6b
k
- G
6a
j
- H
65
e
- I
64
d
- J
67
g
- K
66
f
- L
61
a
- M
60
`
- N
63
c
- O
62
b
- P
7d
}
- Q
7c
|
- R
7f
- S
7e
~
- T
79
y
- U
78
x
- V
7b
{
- W
7a
z
- X
75
u
- Y
74
t
- Z
77
w
- !
0c
&#12;
- "
0f
- #
0e
- $
09
- %
08
- &
0b
&#11;
- '
0a
- (
05
- )
04
- *
07
- +
06
- ,
01
- -
00
- .
03
- /
02
- :
17
- ;
16
- <
11
- =
10
- >
13
- ?
12
- @
6d
m
- [
76
v
- \
71
q
- ]
70
p
- ^
73
s
- _
72
r
- `
4d
M
- {
56
V
- |
51
Q
- }
50
P
- ~
53
S

0d

24
$

27
'

20
- &#11;
26
&
- &#12;
21
!
. 0
1e
. 1
1f
. 2
1c
. 3
1d
. 4
1a
. 5
1b
. 6
18
. 7
19
. 8
16
. 9
17
. a
4f
O
. b
4c
L
. c
4d
M
. d
4a
J
. e
4b
K
. f
48
H
. g
49
I
. h
46
F
. i
47
G
. j
44
D
. k
45
E
. l
42
B
. m
43
C
. n
40
@
. o
41
A
. p
5e
^
. q
5f
_
. r
5c
\
. s
5d
]
. t
5a
Z
. u
5b
[
. v
58
X
. w
59
Y
. x
56
V
. y
57
W
. z
54
T
. A
6f
o
. B
6c
l
. C
6d
m
. D
6a
j
. E
6b
k
. F
68
h
. G
69
i
. H
66
f
. I
67
g
. J
64
d
. K
65
e
. L
62
b
. M
63
c
. N
60
`
. O
61
a
. P
7e
~
. Q
7f
. R
7c
|
. S
7d
}
. T
7a
z
. U
7b
{
. V
78
x
. W
79
y
. X
76
v
. Y
77
w
. Z
74
t
. !
0f
. "
0c
&#12;
. #
0d
. $
0a
. %
0b
&#11;
. &
08
. '
09
. (
06
. )
07
. *
04
. +
05
. ,
02
. -
03
. .
00
. /
01
. :
14
. ;
15
. <
12
. =
13
. >
10
. ?
11
. @
6e
n
. [
75
u
. \
72
r
. ]
73
s
. ^
70
p
. _
71
q
. `
4e
N
. {
55
U
. |
52
R
. }
53
S
. ~
50
P

0e

27
'

24
$

23
#
. &#11;
25
%
. &#12;
22
"
/ 0
1f
/ 1
1e
/ 2
1d
/ 3
1c
/ 4
1b
/ 5
1a
/ 6
19
/ 7
18
/ 8
17
/ 9
16
/ a
4e
N
/ b
4d
M
/ c
4c
L
/ d
4b
K
/ e
4a
J
/ f
49
I
/ g
48
H
/ h
47
G
/ i
46
F
/ j
45
E
/ k
44
D
/ l
43
C
/ m
42
B
/ n
41
A
/ o
40
@
/ p
5f
_
/ q
5e
^
/ r
5d
]
/ s
5c
\
/ t
5b
[
/ u
5a
Z
/ v
59
Y
/ w
58
X
/ x
57
W
/ y
56
V
/ z
55
U
/ A
6e
n
/ B
6d
m
/ C
6c
l
/ D
6b
k
/ E
6a
j
/ F
69
i
/ G
68
h
/ H
67
g
/ I
66
f
/ J
65
e
/ K
64
d
/ L
63
c
/ M
62
b
/ N
61
a
/ O
60
`
/ P
7f
/ Q
7e
~
/ R
7d
}
/ S
7c
|
/ T
7b
{
/ U
7a
z
/ V
79
y
/ W
78
x
/ X
77
w
/ Y
76
v
/ Z
75
u
/ !
0e
/ "
0d
/ #
0c
&#12;
/ $
0b
&#11;
/ %
0a
/ &
09
/ '
08
/ (
07
/ )
06
/ *
05
/ +
04
/ ,
03
/ -
02
/ .
01
/ /
00
/ :
15
/ ;
14
/ <
13
/ =
12
/ >
11
/ ?
10
/ @
6f
o
/ [
74
t
/ \
73
s
/ ]
72
r
/ ^
71
q
/ _
70
p
/ `
4f
O
/ {
54
T
/ |
53
S
/ }
52
R
/ ~
51
Q

0f

26
&

25
%

22
"
/ &#11;
24
$
/ &#12;
23
#
: 0
0a
: 1
0b
&#11;
: 2
08
: 3
09
: 4
0e
: 5
0f
: 6
0c
&#12;
: 7
0d
: 8
02
: 9
03
: a
5b
[
: b
58
X
: c
59
Y
: d
5e
^
: e
5f
_
: f
5c
\
: g
5d
]
: h
52
R
: i
53
S
: j
50
P
: k
51
Q
: l
56
V
: m
57
W
: n
54
T
: o
55
U
: p
4a
J
: q
4b
K
: r
48
H
: s
49
I
: t
4e
N
: u
4f
O
: v
4c
L
: w
4d
M
: x
42
B
: y
43
C
: z
40
@
: A
7b
{
: B
78
x
: C
79
y
: D
7e
~
: E
7f
: F
7c
|
: G
7d
}
: H
72
r
: I
73
s
: J
70
p
: K
71
q
: L
76
v
: M
77
w
: N
74
t
: O
75
u
: P
6a
j
: Q
6b
k
: R
68
h
: S
69
i
: T
6e
n
: U
6f
o
: V
6c
l
: W
6d
m
: X
62
b
: Y
63
c
: Z
60
`
: !
1b
: "
18
: #
19
: $
1e
: %
1f
: &
1c
: '
1d
: (
12
: )
13
: *
10
: +
11
: ,
16
: -
17
: .
14
: /
15
: :
00
: ;
01
: <
06
: =
07
: >
04
: ?
05
: @
7a
z
: [
61
a
: \
66
f
: ]
67
g
: ^
64
d
: _
65
e
: `
5a
Z
: {
41
A
: |
46
F
: }
47
G
: ~
44
D

1a

33
3

30
0

37
7
: &#11;
31
1
: &#12;
36
6
; 0
0b
&#11;
; 1
0a
; 2
09
; 3
08
; 4
0f
; 5
0e
; 6
0d
; 7
0c
&#12;
; 8
03
; 9
02
; a
5a
Z
; b
59
Y
; c
58
X
; d
5f
_
; e
5e
^
; f
5d
]
; g
5c
\
; h
53
S
; i
52
R
; j
51
Q
; k
50
P
; l
57
W
; m
56
V
; n
55
U
; o
54
T
; p
4b
K
; q
4a
J
; r
49
I
; s
48
H
; t
4f
O
; u
4e
N
; v
4d
M
; w
4c
L
; x
43
C
; y
42
B
; z
41
A
; A
7a
z
; B
79
y
; C
78
x
; D
7f
; E
7e
~
; F
7d
}
; G
7c
|
; H
73
s
; I
72
r
; J
71
q
; K
70
p
; L
77
w
; M
76
v
; N
75
u
; O
74
t
; P
6b
k
; Q
6a
j
; R
69
i
; S
68
h
; T
6f
o
; U
6e
n
; V
6d
m
; W
6c
l
; X
63
c
; Y
62
b
; Z
61
a
; !
1a
; "
19
; #
18
; $
1f
; %
1e
; &
1d
; '
1c
; (
13
; )
12
; *
11
; +
10
; ,
17
; -
16
; .
15
; /
14
; :
01
; ;
00
; <
07
; =
06
; >
05
; ?
04
; @
7b
{
; [
60
`
; \
67
g
; ]
66
f
; ^
65
e
; _
64
d
; `
5b
[
; {
40
@
; |
47
G
; }
46
F
; ~
45
E

1b

32
2

31
1

36
6
; &#11;
30
0
; &#12;
37
7
< 0
0c
&#12;
< 1
0d
< 2
0e
< 3
0f
< 4
08
< 5
09
< 6
0a
< 7
0b
&#11;
< 8
04
< 9
05
< a
5d
]
< b
5e
^
< c
5f
_
< d
58
X
< e
59
Y
< f
5a
Z
< g
5b
[
< h
54
T
< i
55
U
< j
56
V
< k
57
W
< l
50
P
< m
51
Q
< n
52
R
< o
53
S
< p
4c
L
< q
4d
M
< r
4e
N
< s
4f
O
< t
48
H
< u
49
I
< v
4a
J
< w
4b
K
< x
44
D
< y
45
E
< z
46
F
< A
7d
}
< B
7e
~
< C
7f
< D
78
x
< E
79
y
< F
7a
z
< G
7b
{
< H
74
t
< I
75
u
< J
76
v
< K
77
w
< L
70
p
< M
71
q
< N
72
r
< O
73
s
< P
6c
l
< Q
6d
m
< R
6e
n
< S
6f
o
< T
68
h
< U
69
i
< V
6a
j
< W
6b
k
< X
64
d
< Y
65
e
< Z
66
f
< !
1d
< "
1e
< #
1f
< $
18
< %
19
< &
1a
< '
1b
< (
14
< )
15
< *
16
< +
17
< ,
10
< -
11
< .
12
< /
13
< :
06
< ;
07
< <
00
< =
01
< >
02
< ?
03
< @
7c
|
< [
67
g
< \
60
`
< ]
61
a
< ^
62
b
< _
63
c
< `
5c
\
< {
47
G
< |
40
@
< }
41
A
< ~
42
B

1c

35
5

36
6

31
1
< &#11;
37
7
< &#12;
30
0
= 0
0d
= 1
0c
&#12;
= 2
0f
= 3
0e
= 4
09
= 5
08
= 6
0b
&#11;
= 7
0a
= 8
05
= 9
04
= a
5c
\
= b
5f
_
= c
5e
^
= d
59
Y
= e
58
X
= f
5b
[
= g
5a
Z
= h
55
U
= i
54
T
= j
57
W
= k
56
V
= l
51
Q
= m
50
P
= n
53
S
= o
52
R
= p
4d
M
= q
4c
L
= r
4f
O
= s
4e
N
= t
49
I
= u
48
H
= v
4b
K
= w
4a
J
= x
45
E
= y
44
D
= z
47
G
= A
7c
|
= B
7f
= C
7e
~
= D
79
y
= E
78
x
= F
7b
{
= G
7a
z
= H
75
u
= I
74
t
= J
77
w
= K
76
v
= L
71
q
= M
70
p
= N
73
s
= O
72
r
= P
6d
m
= Q
6c
l
= R
6f
o
= S
6e
n
= T
69
i
= U
68
h
= V
6b
k
= W
6a
j
= X
65
e
= Y
64
d
= Z
67
g
= !
1c
= "
1f
= #
1e
= $
19
= %
18
= &
1b
= '
1a
= (
15
= )
14
= *
17
= +
16
= ,
11
= -
10
= .
13
= /
12
= :
07
= ;
06
= <
01
= =
00
= >
03
= ?
02
= @
7d
}
= [
66
f
= \
61
a
= ]
60
`
= ^
63
c
= _
62
b
= `
5d
]
= {
46
F
= |
41
A
= }
40
@
= ~
43
C

1d

34
4

37
7

30
0
= &#11;
36
6
= &#12;
31
1
> 0
0e
> 1
0f
> 2
0c
&#12;
> 3
0d
> 4
0a
> 5
0b
&#11;
> 6
08
> 7
09
> 8
06
> 9
07
> a
5f
_
> b
5c
\
> c
5d
]
> d
5a
Z
> e
5b
[
> f
58
X
> g
59
Y
> h
56
V
> i
57
W
> j
54
T
> k
55
U
> l
52
R
> m
53
S
> n
50
P
> o
51
Q
> p
4e
N
> q
4f
O
> r
4c
L
> s
4d
M
> t
4a
J
> u
4b
K
> v
48
H
> w
49
I
> x
46
F
> y
47
G
> z
44
D
> A
7f
> B
7c
|
> C
7d
}
> D
7a
z
> E
7b
{
> F
78
x
> G
79
y
> H
76
v
> I
77
w
> J
74
t
> K
75
u
> L
72
r
> M
73
s
> N
70
p
> O
71
q
> P
6e
n
> Q
6f
o
> R
6c
l
> S
6d
m
> T
6a
j
> U
6b
k
> V
68
h
> W
69
i
> X
66
f
> Y
67
g
> Z
64
d
> !
1f
> "
1c
> #
1d
> $
1a
> %
1b
> &
18
> '
19
> (
16
> )
17
> *
14
> +
15
> ,
12
> -
13
> .
10
> /
11
> :
04
> ;
05
> <
02
> =
03
> >
00
> ?
01
> @
7e
~
> [
65
e
> \
62
b
> ]
63
c
> ^
60
`
> _
61
a
> `
5e
^
> {
45
E
> |
42
B
> }
43
C
> ~
40
@

1e

37
7

34
4

33
3
> &#11;
35
5
> &#12;
32
2
? 0
0f
? 1
0e
? 2
0d
? 3
0c
&#12;
? 4
0b
&#11;
? 5
0a
? 6
09
? 7
08
? 8
07
? 9
06
? a
5e
^
? b
5d
]
? c
5c
\
? d
5b
[
? e
5a
Z
? f
59
Y
? g
58
X
? h
57
W
? i
56
V
? j
55
U
? k
54
T
? l
53
S
? m
52
R
? n
51
Q
? o
50
P
? p
4f
O
? q
4e
N
? r
4d
M
? s
4c
L
? t
4b
K
? u
4a
J
? v
49
I
? w
48
H
? x
47
G
? y
46
F
? z
45
E
? A
7e
~
? B
7d
}
? C
7c
|
? D
7b
{
? E
7a
z
? F
79
y
? G
78
x
? H
77
w
? I
76
v
? J
75
u
? K
74
t
? L
73
s
? M
72
r
? N
71
q
? O
70
p
? P
6f
o
? Q
6e
n
? R
6d
m
? S
6c
l
? T
6b
k
? U
6a
j
? V
69
i
? W
68
h
? X
67
g
? Y
66
f
? Z
65
e
? !
1e
? "
1d
? #
1c
? $
1b
? %
1a
? &
19
? '
18
? (
17
? )
16
? *
15
? +
14
? ,
13
? -
12
? .
11
? /
10
? :
05
? ;
04
? <
03
? =
02
? >
01
? ?
00
? @
7f
? [
64
d
? \
63
c
? ]
62
b
? ^
61
a
? _
60
`
? `
5f
_
? {
44
D
? |
43
C
? }
42
B
? ~
41
A

1f

36
6

35
5

32
2
? &#11;
34
4
? &#12;
33
3
@ 0
70
p
@ 1
71
q
@ 2
72
r
@ 3
73
s
@ 4
74
t
@ 5
75
u
@ 6
76
v
@ 7
77
w
@ 8
78
x
@ 9
79
y
@ a
21
!
@ b
22
"
@ c
23
#
@ d
24
$
@ e
25
%
@ f
26
&
@ g
27
'
@ h
28
(
@ i
29
)
@ j
2a
*
@ k
2b
+
@ l
2c
,
@ m
2d
-
@ n
2e
.
@ o
2f
/
@ p
30
0
@ q
31
1
@ r
32
2
@ s
33
3
@ t
34
4
@ u
35
5
@ v
36
6
@ w
37
7
@ x
38
8
@ y
39
9
@ z
3a
:
@ A
01
@ B
02
@ C
03
@ D
04
@ E
05
@ F
06
@ G
07
@ H
08
@ I
09
@ J
0a
@ K
0b
&#11;
@ L
0c
&#12;
@ M
0d
@ N
0e
@ O
0f
@ P
10
@ Q
11
@ R
12
@ S
13
@ T
14
@ U
15
@ V
16
@ W
17
@ X
18
@ Y
19
@ Z
1a
@ !
61
a
@ "
62
b
@ #
63
c
@ $
64
d
@ %
65
e
@ &
66
f
@ '
67
g
@ (
68
h
@ )
69
i
@ *
6a
j
@ +
6b
k
@ ,
6c
l
@ -
6d
m
@ .
6e
n
@ /
6f
o
@ :
7a
z
@ ;
7b
{
@ <
7c
|
@ =
7d
}
@ >
7e
~
@ ?
7f
@ @
00
@ [
1b
@ \
1c
@ ]
1d
@ ^
1e
@ _
1f
@ `
20
@ {
3b
;
@ |
3c
<
@ }
3d
=
@ ~
3e
>

60
`

49
I

4a
J

4d
M
@ &#11;
4b
K
@ &#12;
4c
L
[ 0
6b
k
[ 1
6a
j
[ 2
69
i
[ 3
68
h
[ 4
6f
o
[ 5
6e
n
[ 6
6d
m
[ 7
6c
l
[ 8
63
c
[ 9
62
b
[ a
3a
:
[ b
39
9
[ c
38
8
[ d
3f
?
[ e
3e
>
[ f
3d
=
[ g
3c
<
[ h
33
3
[ i
32
2
[ j
31
1
[ k
30
0
[ l
37
7
[ m
36
6
[ n
35
5
[ o
34
4
[ p
2b
+
[ q
2a
*
[ r
29
)
[ s
28
(
[ t
2f
/
[ u
2e
.
[ v
2d
-
[ w
2c
,
[ x
23
#
[ y
22
"
[ z
21
!
[ A
1a
[ B
19
[ C
18
[ D
1f
[ E
1e
[ F
1d
[ G
1c
[ H
13
[ I
12
[ J
11
[ K
10
[ L
17
[ M
16
[ N
15
[ O
14
[ P
0b
&#11;
[ Q
0a
[ R
09
[ S
08
[ T
0f
[ U
0e
[ V
0d
[ W
0c
&#12;
[ X
03
[ Y
02
[ Z
01
[ !
7a
z
[ "
79
y
[ #
78
x
[ $
7f
[ %
7e
~
[ &
7d
}
[ '
7c
|
[ (
73
s
[ )
72
r
[ *
71
q
[ +
70
p
[ ,
77
w
[ -
76
v
[ .
75
u
[ /
74
t
[ :
61
a
[ ;
60
`
[ <
67
g
[ =
66
f
[ >
65
e
[ ?
64
d
[ @
1b
[ [
00
[ \
07
[ ]
06
[ ^
05
[ _
04
[ `
3b
;
[ {
20
[ |
27
'
[ }
26
&
[ ~
25
%

7b
{

52
R

51
Q

56
V
[ &#11;
50
P
[ &#12;
57
W
\ 0
6c
l
\ 1
6d
m
\ 2
6e
n
\ 3
6f
o
\ 4
68
h
\ 5
69
i
\ 6
6a
j
\ 7
6b
k
\ 8
64
d
\ 9
65
e
\ a
3d
=
\ b
3e
>
\ c
3f
?
\ d
38
8
\ e
39
9
\ f
3a
:
\ g
3b
;
\ h
34
4
\ i
35
5
\ j
36
6
\ k
37
7
\ l
30
0
\ m
31
1
\ n
32
2
\ o
33
3
\ p
2c
,
\ q
2d
-
\ r
2e
.
\ s
2f
/
\ t
28
(
\ u
29
)
\ v
2a
*
\ w
2b
+
\ x
24
$
\ y
25
%
\ z
26
&
\ A
1d
\ B
1e
\ C
1f
\ D
18
\ E
19
\ F
1a
\ G
1b
\ H
14
\ I
15
\ J
16
\ K
17
\ L
10
\ M
11
\ N
12
\ O
13
\ P
0c
&#12;
\ Q
0d
\ R
0e
\ S
0f
\ T
08
\ U
09
\ V
0a
\ W
0b
&#11;
\ X
04
\ Y
05
\ Z
06
\ !
7d
}
\ "
7e
~
\ #
7f
\ $
78
x
\ %
79
y
\ &
7a
z
\ '
7b
{
\ (
74
t
\ )
75
u
\ *
76
v
\ +
77
w
\ ,
70
p
\ -
71
q
\ .
72
r
\ /
73
s
\ :
66
f
\ ;
67
g
\ <
60
`
\ =
61
a
\ >
62
b
\ ?
63
c
\ @
1c
\ [
07
\ \
00
\ ]
01
\ ^
02
\ _
03
\ `
3c
<
\ {
27
'
\ |
20
\ }
21
!
\ ~
22
"

7c
|

55
U

56
V

51
Q
\ &#11;
57
W
\ &#12;
50
P
] 0
6d
m
] 1
6c
l
] 2
6f
o
] 3
6e
n
] 4
69
i
] 5
68
h
] 6
6b
k
] 7
6a
j
] 8
65
e
] 9
64
d
] a
3c
<
] b
3f
?
] c
3e
>
] d
39
9
] e
38
8
] f
3b
;
] g
3a
:
] h
35
5
] i
34
4
] j
37
7
] k
36
6
] l
31
1
] m
30
0
] n
33
3
] o
32
2
] p
2d
-
] q
2c
,
] r
2f
/
] s
2e
.
] t
29
)
] u
28
(
] v
2b
+
] w
2a
*
] x
25
%
] y
24
$
] z
27
'
] A
1c
] B
1f
] C
1e
] D
19
] E
18
] F
1b
] G
1a
] H
15
] I
14
] J
17
] K
16
] L
11
] M
10
] N
13
] O
12
] P
0d
] Q
0c
&#12;
] R
0f
] S
0e
] T
09
] U
08
] V
0b
&#11;
] W
0a
] X
05
] Y
04
] Z
07
] !
7c
|
] "
7f
] #
7e
~
] $
79
y
] %
78
x
] &
7b
{
] '
7a
z
] (
75
u
] )
74
t
] *
77
w
] +
76
v
] ,
71
q
] -
70
p
] .
73
s
] /
72
r
] :
67
g
] ;
66
f
] <
61
a
] =
60
`
] >
63
c
] ?
62
b
] @
1d
] [
06
] \
01
] ]
00
] ^
03
] _
02
] `
3d
=
] {
26
&
] |
21
!
] }
20
] ~
23
#

7d
}

54
T

57
W

50
P
] &#11;
56
V
] &#12;
51
Q
^ 0
6e
n
^ 1
6f
o
^ 2
6c
l
^ 3
6d
m
^ 4
6a
j
^ 5
6b
k
^ 6
68
h
^ 7
69
i
^ 8
66
f
^ 9
67
g
^ a
3f
?
^ b
3c
<
^ c
3d
=
^ d
3a
:
^ e
3b
;
^ f
38
8
^ g
39
9
^ h
36
6
^ i
37
7
^ j
34
4
^ k
35
5
^ l
32
2
^ m
33
3
^ n
30
0
^ o
31
1
^ p
2e
.
^ q
2f
/
^ r
2c
,
^ s
2d
-
^ t
2a
*
^ u
2b
+
^ v
28
(
^ w
29
)
^ x
26
&
^ y
27
'
^ z
24
$
^ A
1f
^ B
1c
^ C
1d
^ D
1a
^ E
1b
^ F
18
^ G
19
^ H
16
^ I
17
^ J
14
^ K
15
^ L
12
^ M
13
^ N
10
^ O
11
^ P
0e
^ Q
0f
^ R
0c
&#12;
^ S
0d
^ T
0a
^ U
0b
&#11;
^ V
08
^ W
09
^ X
06
^ Y
07
^ Z
04
^ !
7f
^ "
7c
|
^ #
7d
}
^ $
7a
z
^ %
7b
{
^ &
78
x
^ '
79
y
^ (
76
v
^ )
77
w
^ *
74
t
^ +
75
u
^ ,
72
r
^ -
73
s
^ .
70
p
^ /
71
q
^ :
64
d
^ ;
65
e
^ <
62
b
^ =
63
c
^ >
60
`
^ ?
61
a
^ @
1e
^ [
05
^ \
02
^ ]
03
^ ^
00
^ _
01
^ `
3e
>
^ {
25
%
^ |
22
"
^ }
23
#
^ ~
20

7e
~

57
W

54
T

53
S
^ &#11;
55
U
^ &#12;
52
R
_ 0
6f
o
_ 1
6e
n
_ 2
6d
m
_ 3
6c
l
_ 4
6b
k
_ 5
6a
j
_ 6
69
i
_ 7
68
h
_ 8
67
g
_ 9
66
f
_ a
3e
>
_ b
3d
=
_ c
3c
<
_ d
3b
;
_ e
3a
:
_ f
39
9
_ g
38
8
_ h
37
7
_ i
36
6
_ j
35
5
_ k
34
4
_ l
33
3
_ m
32
2
_ n
31
1
_ o
30
0
_ p
2f
/
_ q
2e
.
_ r
2d
-
_ s
2c
,
_ t
2b
+
_ u
2a
*
_ v
29
)
_ w
28
(
_ x
27
'
_ y
26
&
_ z
25
%
_ A
1e
_ B
1d
_ C
1c
_ D
1b
_ E
1a
_ F
19
_ G
18
_ H
17
_ I
16
_ J
15
_ K
14
_ L
13
_ M
12
_ N
11
_ O
10
_ P
0f
_ Q
0e
_ R
0d
_ S
0c
&#12;
_ T
0b
&#11;
_ U
0a
_ V
09
_ W
08
_ X
07
_ Y
06
_ Z
05
_ !
7e
~
_ "
7d
}
_ #
7c
|
_ $
7b
{
_ %
7a
z
_ &
79
y
_ '
78
x
_ (
77
w
_ )
76
v
_ *
75
u
_ +
74
t
_ ,
73
s
_ -
72
r
_ .
71
q
_ /
70
p
_ :
65
e
_ ;
64
d
_ <
63
c
_ =
62
b
_ >
61
a
_ ?
60
`
_ @
1f
_ [
04
_ \
03
_ ]
02
_ ^
01
_ _
00
_ `
3f
?
_ {
24
$
_ |
23
#
_ }
22
"
_ ~
21
!

7f

56
V

55
U

52
R
_ &#11;
54
T
_ &#12;
53
S
` 0
50
P
` 1
51
Q
` 2
52
R
` 3
53
S
` 4
54
T
` 5
55
U
` 6
56
V
` 7
57
W
` 8
58
X
` 9
59
Y
` a
01
` b
02
` c
03
` d
04
` e
05
` f
06
` g
07
` h
08
` i
09
` j
0a
` k
0b
&#11;
` l
0c
&#12;
` m
0d
` n
0e
` o
0f
` p
10
` q
11
` r
12
` s
13
` t
14
` u
15
` v
16
` w
17
` x
18
` y
19
` z
1a
` A
21
!
` B
22
"
` C
23
#
` D
24
$
` E
25
%
` F
26
&
` G
27
'
` H
28
(
` I
29
)
` J
2a
*
` K
2b
+
` L
2c
,
` M
2d
-
` N
2e
.
` O
2f
/
` P
30
0
` Q
31
1
` R
32
2
` S
33
3
` T
34
4
` U
35
5
` V
36
6
` W
37
7
` X
38
8
` Y
39
9
` Z
3a
:
` !
41
A
` "
42
B
` #
43
C
` $
44
D
` %
45
E
` &
46
F
` '
47
G
` (
48
H
` )
49
I
` *
4a
J
` +
4b
K
` ,
4c
L
` -
4d
M
` .
4e
N
` /
4f
O
` :
5a
Z
` ;
5b
[
` <
5c
\
` =
5d
]
` >
5e
^
` ?
5f
_
` @
20
` [
3b
;
` \
3c
<
` ]
3d
=
` ^
3e
>
` _
3f
?
` `
00
` {
1b
` |
1c
` }
1d
` ~
1e

40
@

69
i

6a
j

6d
m
` &#11;
6b
k
` &#12;
6c
l
{ 0
4b
K
{ 1
4a
J
{ 2
49
I
{ 3
48
H
{ 4
4f
O
{ 5
4e
N
{ 6
4d
M
{ 7
4c
L
{ 8
43
C
{ 9
42
B
{ a
1a
{ b
19
{ c
18
{ d
1f
{ e
1e
{ f
1d
{ g
1c
{ h
13
{ i
12
{ j
11
{ k
10
{ l
17
{ m
16
{ n
15
{ o
14
{ p
0b
&#11;
{ q
0a
{ r
09
{ s
08
{ t
0f
{ u
0e
{ v
0d
{ w
0c
&#12;
{ x
03
{ y
02
{ z
01
{ A
3a
:
{ B
39
9
{ C
38
8
{ D
3f
?
{ E
3e
>
{ F
3d
=
{ G
3c
<
{ H
33
3
{ I
32
2
{ J
31
1
{ K
30
0
{ L
37
7
{ M
36
6
{ N
35
5
{ O
34
4
{ P
2b
+
{ Q
2a
*
{ R
29
)
{ S
28
(
{ T
2f
/
{ U
2e
.
{ V
2d
-
{ W
2c
,
{ X
23
#
{ Y
22
"
{ Z
21
!
{ !
5a
Z
{ "
59
Y
{ #
58
X
{ $
5f
_
{ %
5e
^
{ &
5d
]
{ '
5c
\
{ (
53
S
{ )
52
R
{ *
51
Q
{ +
50
P
{ ,
57
W
{ -
56
V
{ .
55
U
{ /
54
T
{ :
41
A
{ ;
40
@
{ <
47
G
{ =
46
F
{ >
45
E
{ ?
44
D
{ @
3b
;
{ [
20
{ \
27
'
{ ]
26
&
{ ^
25
%
{ _
24
$
{ `
1b
{ {
00
{ |
07
{ }
06
{ ~
05

5b
[

72
r

71
q

76
v
{ &#11;
70
p
{ &#12;
77
w
| 0
4c
L
| 1
4d
M
| 2
4e
N
| 3
4f
O
| 4
48
H
| 5
49
I
| 6
4a
J
| 7
4b
K
| 8
44
D
| 9
45
E
| a
1d
| b
1e
| c
1f
| d
18
| e
19
| f
1a
| g
1b
| h
14
| i
15
| j
16
| k
17
| l
10
| m
11
| n
12
| o
13
| p
0c
&#12;
| q
0d
| r
0e
| s
0f
| t
08
| u
09
| v
0a
| w
0b
&#11;
| x
04
| y
05
| z
06
| A
3d
=
| B
3e
>
| C
3f
?
| D
38
8
| E
39
9
| F
3a
:
| G
3b
;
| H
34
4
| I
35
5
| J
36
6
| K
37
7
| L
30
0
| M
31
1
| N
32
2
| O
33
3
| P
2c
,
| Q
2d
-
| R
2e
.
| S
2f
/
| T
28
(
| U
29
)
| V
2a
*
| W
2b
+
| X
24
$
| Y
25
%
| Z
26
&
| !
5d
]
| "
5e
^
| #
5f
_
| $
58
X
| %
59
Y
| &
5a
Z
| '
5b
[
| (
54
T
| )
55
U
| *
56
V
| +
57
W
| ,
50
P
| -
51
Q
| .
52
R
| /
53
S
| :
46
F
| ;
47
G
| <
40
@
| =
41
A
| >
42
B
| ?
43
C
| @
3c
<
| [
27
'
| \
20
| ]
21
!
| ^
22
"
| _
23
#
| `
1c
| {
07
| |
00
| }
01
| ~
02

5c
\

75
u

76
v

71
q
| &#11;
77
w
| &#12;
70
p
} 0
4d
M
} 1
4c
L
} 2
4f
O
} 3
4e
N
} 4
49
I
} 5
48
H
} 6
4b
K
} 7
4a
J
} 8
45
E
} 9
44
D
} a
1c
} b
1f
} c
1e
} d
19
} e
18
} f
1b
} g
1a
} h
15
} i
14
} j
17
} k
16
} l
11
} m
10
} n
13
} o
12
} p
0d
} q
0c
&#12;
} r
0f
} s
0e
} t
09
} u
08
} v
0b
&#11;
} w
0a
} x
05
} y
04
} z
07
} A
3c
<
} B
3f
?
} C
3e
>
} D
39
9
} E
38
8
} F
3b
;
} G
3a
:
} H
35
5
} I
34
4
} J
37
7
} K
36
6
} L
31
1
} M
30
0
} N
33
3
} O
32
2
} P
2d
-
} Q
2c
,
} R
2f
/
} S
2e
.
} T
29
)
} U
28
(
} V
2b
+
} W
2a
*
} X
25
%
} Y
24
$
} Z
27
'
} !
5c
\
} "
5f
_
} #
5e
^
} $
59
Y
} %
58
X
} &
5b
[
} '
5a
Z
} (
55
U
} )
54
T
} *
57
W
} +
56
V
} ,
51
Q
} -
50
P
} .
53
S
} /
52
R
} :
47
G
} ;
46
F
} <
41
A
} =
40
@
} >
43
C
} ?
42
B
} @
3d
=
} [
26
&
} \
21
!
} ]
20
} ^
23
#
} _
22
"
} `
1d
} {
06
} |
01
} }
00
} ~
03

5d
]

74
t

77
w

70
p
} &#11;
76
v
} &#12;
71
q
~ 0
4e
N
~ 1
4f
O
~ 2
4c
L
~ 3
4d
M
~ 4
4a
J
~ 5
4b
K
~ 6
48
H
~ 7
49
I
~ 8
46
F
~ 9
47
G
~ a
1f
~ b
1c
~ c
1d
~ d
1a
~ e
1b
~ f
18
~ g
19
~ h
16
~ i
17
~ j
14
~ k
15
~ l
12
~ m
13
~ n
10
~ o
11
~ p
0e
~ q
0f
~ r
0c
&#12;
~ s
0d
~ t
0a
~ u
0b
&#11;
~ v
08
~ w
09
~ x
06
~ y
07
~ z
04
~ A
3f
?
~ B
3c
<
~ C
3d
=
~ D
3a
:
~ E
3b
;
~ F
38
8
~ G
39
9
~ H
36
6
~ I
37
7
~ J
34
4
~ K
35
5
~ L
32
2
~ M
33
3
~ N
30
0
~ O
31
1
~ P
2e
.
~ Q
2f
/
~ R
2c
,
~ S
2d
-
~ T
2a
*
~ U
2b
+
~ V
28
(
~ W
29
)
~ X
26
&
~ Y
27
'
~ Z
24
$
~ !
5f
_
~ "
5c
\
~ #
5d
]
~ $
5a
Z
~ %
5b
[
~ &
58
X
~ '
59
Y
~ (
56
V
~ )
57
W
~ *
54
T
~ +
55
U
~ ,
52
R
~ -
53
S
~ .
50
P
~ /
51
Q
~ :
44
D
~ ;
45
E
~ <
42
B
~ =
43
C
~ >
40
@
~ ?
41
A
~ @
3e
>
~ [
25
%
~ \
22
"
~ ]
23
#
~ ^
20
~ _
21
!
~ `
1e
~ {
05
~ |
02
~ }
03
~ ~
00

5e
^

77
w

74
t

73
s
~ &#11;
75
u
~ &#12;
72
r
 0
10
 1
11
 2
12
 3
13
 4
14
 5
15
 6
16
 7
17
 8
18
 9
19
 a
41
A
 b
42
B
 c
43
C
 d
44
D
 e
45
E
 f
46
F
 g
47
G
 h
48
H
 i
49
I
 j
4a
J
 k
4b
K
 l
4c
L
 m
4d
M
 n
4e
N
 o
4f
O
 p
50
P
 q
51
Q
 r
52
R
 s
53
S
 t
54
T
 u
55
U
 v
56
V
 w
57
W
 x
58
X
 y
59
Y
 z
5a
Z
 A
61
a
 B
62
b
 C
63
c
 D
64
d
 E
65
e
 F
66
f
 G
67
g
 H
68
h
 I
69
i
 J
6a
j
 K
6b
k
 L
6c
l
 M
6d
m
 N
6e
n
 O
6f
o
 P
70
p
 Q
71
q
 R
72
r
 S
73
s
 T
74
t
 U
75
u
 V
76
v
 W
77
w
 X
78
x
 Y
79
y
 Z
7a
z
 !
01
 "
02
 #
03
 $
04
 %
05
 &
06
 '
07
 (
08
 )
09
 *
0a
 +
0b
&#11;
 ,
0c
&#12;
 -
0d
 .
0e
 /
0f
 :
1a
 ;
1b
 <
1c
 =
1d
 >
1e
 ?
1f
 @
60
`
 [
7b
{
 \
7c
|
 ]
7d
}
 ^
7e
~
 _
7f
 `
40
@
 {
5b
[
 |
5c
\
 }
5d
]
 ~
5e
^
 
00
 
29
)
 
2a
*
 
2d
-
 &#11;
2b
+
 &#12;
2c
,
 0
39
9
 1
38
8
 2
3b
;
 3
3a
:
 4
3d
=
 5
3c
<
 6
3f
?
 7
3e
>
 8
31
1
 9
30
0
 a
68
h
 b
6b
k
 c
6a
j
 d
6d
m
 e
6c
l
 f
6f
o
 g
6e
n
 h
61
a
 i
60
`
 j
63
c
 k
62
b
 l
65
e
 m
64
d
 n
67
g
 o
66
f
 p
79
y
 q
78
x
 r
7b
{
 s
7a
z
 t
7d
}
 u
7c
|
 v
7f
 w
7e
~
 x
71
q
 y
70
p
 z
73
s
 A
48
H
 B
4b
K
 C
4a
J
 D
4d
M
 E
4c
L
 F
4f
O
 G
4e
N
 H
41
A
 I
40
@
 J
43
C
 K
42
B
 L
45
E
 M
44
D
 N
47
G
 O
46
F
 P
59
Y
 Q
58
X
 R
5b
[
 S
5a
Z
 T
5d
]
 U
5c
\
 V
5f
_
 W
5e
^
 X
51
Q
 Y
50
P
 Z
53
S
 !
28
(
 "
2b
+
 #
2a
*
 $
2d
-
 %
2c
,
 &
2f
/
 '
2e
.
 (
21
!
 )
20
 *
23
#
 +
22
"
 ,
25
%
 -
24
$
 .
27
'
 /
26
&
 :
33
3
 ;
32
2
 <
35
5
 =
34
4
 >
37
7
 ?
36
6
 @
49
I
 [
52
R
 \
55
U
 ]
54
T
 ^
57
W
 _
56
V
 `
69
i
 {
72
r
 |
75
u
 }
74
t
 ~
77
w
 
29
)
 
00
 
03
 
04
 &#11;
02
 &#12;
05
 0
3a
:
 1
3b
;
 2
38
8
 3
39
9
 4
3e
>
 5
3f
?
 6
3c
<
 7
3d
=
 8
32
2
 9
33
3
 a
6b
k
 b
68
h
 c
69
i
 d
6e
n
 e
6f
o
 f
6c
l
 g
6d
m
 h
62
b
 i
63
c
 j
60
`
 k
61
a
 l
66
f
 m
67
g
 n
64
d
 o
65
e
 p
7a
z
 q
7b
{
 r
78
x
 s
79
y
 t
7e
~
 u
7f
 v
7c
|
 w
7d
}
 x
72
r
 y
73
s
 z
70
p
 A
4b
K
 B
48
H
 C
49
I
 D
4e
N
 E
4f
O
 F
4c
L
 G
4d
M
 H
42
B
 I
43
C
 J
40
@